Вы находитесь на странице: 1из 6

Plagiarism Check Report

Department of Computer Science and Engineering

NAME

: M. SATISH KUMAR
HT NO
: 13781D5812
BRANCH
: II M Tech CSE I Shift
GUIDE NAME
: Dr.J.JANET
TITLE NAME : PROVISION OF LONG LASTING AND DECENTRALIZED
CARGO SPACE FOR CLOUD STORAGE SYSTEM
DATE
: 13/05/2015
DESCRIPTION
SOFTWARE

: http://smallseotools.com/plagiarism-checker/

CHECK DETAILS

: Title name and abstract

RESULTS IN TITLE

: 100%

RESULTS IN ABSTRACT

: 89%

TITLE CHECKING:

Title: PROVISION OF LONG LASTING AND DECENTRALIZED


CARGO SPACE FOR CLOUD STORAGE SYSTEM
Plagiarism Checker
To use this plagiarism checker, please copy and paste your content in the box below, and then
click on the big green button that says Check for plagiarism! then sit back and watch as your
article is scanned for duplicated content.

Maximum 1500 words limit per search.


Total Words: 167

Check for Plagiarism


Results:89% Unique Content

cloud system. Encryption schemes available for data privacy Good


storage system. Building a secure storage system that supports Good
central authority. A new idea is proposed proxy re-encryption Good
distributed system. The distributed storage system not only Good
and recovery, but client onward his information in the Good
the data back. The important technical part is that the Good
encrypted data. Our schemes fully integrate encoding, encrypting, Good
integrate encoding, encrypting, and onward Good.
Key terms : Ciphertext, Plaintext Key translation Good,

ABSTRACT CHECKING
ABSTRACT:

An Cloud Storage System has a collection of storage servers

provides long-standing storage services over the internet. Data privacy becomes a major concern
in cloud storage system because user stores his data in third party cloud system. Encryption
schemes available for data privacy but it limit the number of functions done in storage system.
Building a secure storage system that supports multiple functions is tough when the storage
system is distributed and has no central authority. A new idea is proposed proxy re-encryption
scheme for decentralizes erasure code for defending the distributed system. The distributed
storage system not only supports secure and robust data storage and recovery, but client onward
his information in the storage servers to another user without retrieving the data back. The
important technical part is that the proxy re-encryption scheme supports encoding operations
over encrypted data as well as forwarding operations over encoded and encrypted data. Our
schemes fully integrate encoding, encrypting, and onward.

Key terms : Ciphertext, Plaintext Key translation, Proxy re-encryption.

Вам также может понравиться