For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand ...
详细信息
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand by Triple DES and RSA algorithms for data encryption to hide, on the other hand, by the SHA-1 algorithm to validate the integrity of data, it has a wide range of practicality.
Similar to any digital dataset, a digital map is also vulnerable to modification, deliberate alteration and copyright violation. A map is a visual representation of a geographical area that is digitally stored in eith...
详细信息
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th...
详细信息
ISBN:
(纸本)9781538652589;9781538652572
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of the facility it provided. In this, user pays only for the services it uses. Now a days, vast amount of information gets stored over cloud, which include personal file, images, pdf, text, multimedia data etc. So security becomes one of the important issue. Everyone just want to upload, store its data without worrying about the security. IT organization should look after to provide security to the document. Documents content get altered by some outsider attacker, so it is necessary to verify the integrity. This data get duplicated and unnecessary much of the space will get waste. So to avoid this, data must be de-duplicated and uploaded over the cloud server. For this secure hash algorithm is used. It calculates the hash value for chunk of data and store over cloud. Only reducing unnecessary wastage of space is not the solution administrator should look toward the security issue. TPA is used for verification of integrity of the document. This system is proposed for achieving this both issues.
暂无评论