首页    期刊浏览 2025年01月22日 星期三
登录注册

文章基本信息

  • 标题:Authorization in Data Access User Behaviour Profiling With Duplicate Check Measures in Social Network
  • 本地全文:下载
  • 作者:Dr. V.Vijayadeepa ; D.Deepika
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2017
  • 卷号:5
  • 期号:7
  • 页码:13301
  • DOI:10.15680/IJIRCCE.2017.0507060
  • 出版社:S&S Publications
  • 摘要:Most of the e mail servers and website loggers are facing many problems in their activities. Zombiebased vulnerabilities are injected the attacks into the system through network by taking the availability of the server andresponse return to the clients. Data deduplication is method for eliminating duplicate copies of data, to reduce storagespace and upload bandwidth in network. To achieve secure deduplication in network, convergent encryption has beenused.Convergent encryption generates identical ciphertext from identical plaintext files. In social network the duplicatefiles has to be removed from storage without the provider have access to the encryption keys. The problem is there isno efficient and reliable key management. To achieve this Dekey , a new construction in which users no need tomanage any keys on their own but they securely distribute the convergent key shares across multiple servers.Encryption mechanisms not preserve the data in the network from unauthorized access from both inside attacker as wellas outside attacker. To minimize the attacks and also provide security in social network, user behavior and decoyinformation technology called as Fog Computing has to be implemented.
  • 关键词:Network; User Behaviour Profiling; DecoyTechnology.
国家哲学社会科学文献中心版权所有