A Secure Verifiable Storage Deduplication Scheme on Bigdata in Cloud

Authors

  • S. Indirakumari  Department of Computer Science and Engineering, R.M.K Engineering College-Chennai
  • A. Thilagavathy  Department of Computer Science and Engineering, R.M.K Engineering College-Chennai

Keywords:

Deduplication, Big Data, Cloud Computing, Access Control, Proxy Re-Encryption, Memory Management

Abstract

Cloud Computing is a emerging technology where we can get platform as a service, Software as a service, infrastructure as a service, while getting storage as a service from cloud. Memory management are very most important in cloud computing. In existing paper user can upload text files only and not a secured. In existing paper we propose a user can upload all type of files (jpg, gif, png, audio, video, pdf, ppt) using deduplication technology. We propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It is commonly used to reduce the space and bandwidth requirements of service by eliminating redundant data and storing only a single copy of file using cloud service provider. Here we propose secure deduplication to avoid the same files uploaded multiple times.

References

  1. Zheng Yan "Deduplication on Encrypted Big Data in Cloud" ieee Trans on bigdata year: 2016, pp.138-150
  2. Hindong Wu "Data Mining with Big Data" IEEE Trans on Knowledge year: 2014,pp.97-107
  3. M. Bellare, S. Keelveedhi, and T. Ristenpart"Message-locked encryption and secure deduplication" in Proc.Cryptology-EURO-CRYPT, year:2013, pp.296-312.
  4. M. Bellare, S. Keelveedhi, and T. Ristenpart, "DupLESS: Server aided  encryption for deduplicated storage," in Proc. 22nd USENIX Conf. Secur., 2013, pp. 179–194.
  5. Mozy. Mozy: A File Storage and sharing Service. (2016). Online].Available: http://mozy.com
  6. Z. O Wilcox, "Convergent encryption reconsidered", 2011. Online].Available: http: //www.mailarchive.com
  7. Dropbox, A file-storage and sharing service. (2016). Online]. Available: http://www.dropbox.com
  8. G.Ateniese, K. Fu, M. Green, and S.Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. Inform. Syst. Secure., vol. 9, no. 1, pp. 1–30, 2006.
  9. Opendedup. (2016).Online]. Available: http://opendedup.org/
  10. D. T. Meyer and W. J Bolosky, "A study of practical deduplication," ACM Trans. Storage, vol. 7, no. 4, pp. 1–20,2012.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
S. Indirakumari, A. Thilagavathy, " A Secure Verifiable Storage Deduplication Scheme on Bigdata in Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.832-836, March-April-2017.