2018
DOI: 10.11591/ijeecs.v9.i1.pp107-110
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

Abstract: <p>The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…In security performance, confidentiality, integrity and availability of information has turn into the inevitability for the development and implementation for system process [16]. Then, the security in information hiding has major issue about existences of hidden message for sending information that can called availability of data [17].…”
Section: Security Of Steganography Performancementioning
confidence: 99%
“…In security performance, confidentiality, integrity and availability of information has turn into the inevitability for the development and implementation for system process [16]. Then, the security in information hiding has major issue about existences of hidden message for sending information that can called availability of data [17].…”
Section: Security Of Steganography Performancementioning
confidence: 99%