IMAGE AND TEXT ENCRYPTED DATA WITH AUTHORIZED DEDUPLICATION IN THE CLOUD

2022 International Research Journal of Modernization in Engineering Technology and Science  
Role re-encryption is used to avoid privacy data leakage and also to avoid deduplication in a secure role reencryption system (SRRS). And also, checks for proof of ownership to identify whether the user is an authorized user or not. This is for efficiency. The role re-encryption method is to share the access key for the corresponding authorized user for accessing the particular file without the leakage of private data. In our project, we are using both the avoidance of text and digital images.
more » ... or example, we have personal images on our mobile, handheld devices, and the desktop, etc., So, as these images have to keep secure and so we are using encryption to increase high security. The text file is also important for users nowadays. It has to keep secure in a cloud server. Digital images have to be protected over communication, however, generally, personal identification details like copies of pan cards, Passports, ATMs, etc. to store none's pc.
doi:10.56726/irjmets31786 fatcat:isf23k5d7ncrrdjj7fur43t37a