A Novel Approach for Secure Data DEDuplication in Cloud Storage

Penumetsa Shruti

Abstract


Information deduplication is the strategy used to expel the rehashed duplicates of records in the cloud benefit which is utilized to decrease the volume of storage room and the limit. During the time spent deduplication for complex information for ensuring the protection of the information the joined encryption strategy is proposed for encryption of information before the outsourcing. Deduplication gives a considerable measure of advantages of security and protection. To better ensure the information security, in this makes the primary endeavor to authoritatively address the issues of the approved information deduplication and it is Different from the conventional deduplication frameworks, the differential benefits of clients are additionally measured in copy check too the information itself. We likewise exhibit a few new deduplication developments supporting the approved copy check in a half breed cloud engineering. we actualize an energy of proprietorship (POW) for ensured copy check plan and direct testbed tests utilizing our model. We demonstrate that our proposed approved copy check conspire brings about insignificant overhead contrasted with customary operations.

Full Text:

PDF

References


J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.

P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.

J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In Technical Report, 2013.

J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296– 312, 2013.

J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In ASIACCS, pages 195–206, 2013.




DOI: https://doi.org/10.23956/ijarcsse/V7I6/0119

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.