期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2017
卷号:5
期号:7
页码:13301
DOI:10.15680/IJIRCCE.2017.0507060
出版社:S&S Publications
摘要:Most of the e mail servers and website loggers are facing many problems in their activities. Zombiebased vulnerabilities are injected the attacks into the system through network by taking the availability of the server andresponse return to the clients. Data deduplication is method for eliminating duplicate copies of data, to reduce storagespace and upload bandwidth in network. To achieve secure deduplication in network, convergent encryption has beenused.Convergent encryption generates identical ciphertext from identical plaintext files. In social network the duplicatefiles has to be removed from storage without the provider have access to the encryption keys. The problem is there isno efficient and reliable key management. To achieve this Dekey , a new construction in which users no need tomanage any keys on their own but they securely distribute the convergent key shares across multiple servers.Encryption mechanisms not preserve the data in the network from unauthorized access from both inside attacker as wellas outside attacker. To minimize the attacks and also provide security in social network, user behavior and decoyinformation technology called as Fog Computing has to be implemented.
关键词:Network; User Behaviour Profiling; DecoyTechnology.