Secure Access of Folders and Files after Removal of Duplicacy over the Cloud

Deepika Gautam, Suvendi Rimer, Vipin Saxena

Research output: Contribution to journalArticlepeer-review


Cloud Computing has been the most popular approach of computing due to faster access to folders and files at a low cost. Hence, many organizations are shifting the old long database folders and files over the cloud which may be text, audio, video or in the other formats. Due to large size of the database with multiple storages of folders and files over the cloud, there may be chances of duplicate access of the database folders and files which may cause the loss of time of execution or accessing the database files. In the present work, a technique is developed to remove duplicate files in the form of.txt,.doc,.jpg,.pdf as well as duplicate folders after applying a well-known ElGamal algorithm later on converted as fuzzy ElGamal technique, for faster retrieval of files in a very secure manner. For this purpose, Unified Modelling Language (UML) model is developed which has been implemented through Python programming language. The computed results towards the model’s efficiency have been depicted through tables and graphs, on a large database in the form of folders and files of Indian railway reservation system. The present work is significant for the large organizations and also useful for the users working over the cloud for faster accessing of the folders and files.

Original languageEnglish
Pages (from-to)48-60
Number of pages13
JournalInternational Journal of Computer Network and Information Security
Issue number1
Publication statusPublished - Feb 2024


  • Cloud Data Security
  • Cryptography
  • Decryption
  • ElGamal Algorithm
  • Encryption
  • Fuzzy Logic

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Safety Research
  • Computer Science Applications
  • Computer Networks and Communications
  • Applied Mathematics


Dive into the research topics of 'Secure Access of Folders and Files after Removal of Duplicacy over the Cloud'. Together they form a unique fingerprint.

Cite this