A Secure Verifiable Storage Deduplication Scheme on Bigdata in Cloud

Authors(2) :-S. Indirakumari, A. Thilagavathy

Cloud Computing is a emerging technology where we can get platform as a service, Software as a service, infrastructure as a service, while getting storage as a service from cloud. Memory management are very most important in cloud computing. In existing paper user can upload text files only and not a secured. In existing paper we propose a user can upload all type of files (jpg, gif, png, audio, video, pdf, ppt) using deduplication technology. We propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It is commonly used to reduce the space and bandwidth requirements of service by eliminating redundant data and storing only a single copy of file using cloud service provider. Here we propose secure deduplication to avoid the same files uploaded multiple times.

Authors and Affiliations

S. Indirakumari
Department of Computer Science and Engineering, R.M.K Engineering College-Chennai
A. Thilagavathy
Department of Computer Science and Engineering, R.M.K Engineering College-Chennai

Deduplication, Big Data, Cloud Computing, Access Control, Proxy Re-Encryption, Memory Management

  1. Zheng Yan "Deduplication on Encrypted Big Data in Cloud" ieee Trans on bigdata year: 2016, pp.138-150
  2. Hindong Wu "Data Mining with Big Data" IEEE Trans on Knowledge year: 2014,pp.97-107
  3. M. Bellare, S. Keelveedhi, and T. Ristenpart"Message-locked encryption and secure deduplication" in Proc.Cryptology-EURO-CRYPT, year:2013, pp.296-312.
  4. M. Bellare, S. Keelveedhi, and T. Ristenpart, "DupLESS: Server aided  encryption for deduplicated storage," in Proc. 22nd USENIX Conf. Secur., 2013, pp. 179–194.
  5. Mozy. Mozy: A File Storage and sharing Service. (2016). Online].Available: http://mozy.com
  6. Z. O Wilcox, "Convergent encryption reconsidered", 2011. Online].Available: http: //www.mailarchive.com
  7. Dropbox, A file-storage and sharing service. (2016). Online]. Available: http://www.dropbox.com
  8. G.Ateniese, K. Fu, M. Green, and S.Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. Inform. Syst. Secure., vol. 9, no. 1, pp. 1–30, 2006.
  9. Opendedup. (2016).Online]. Available: http://opendedup.org/
  10. D. T. Meyer and W. J Bolosky, "A study of practical deduplication," ACM Trans. Storage, vol. 7, no. 4, pp. 1–20,2012.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 832-836
Manuscript Number : CSEIT1722252
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

S. Indirakumari, A. Thilagavathy, "A Secure Verifiable Storage Deduplication Scheme on Bigdata in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.832-836, March-April-2017.
Journal URL : http://ijsrcseit.com/CSEIT1722252

Article Preview