An Implementation of Hybrid Cloud Approach for Secure Authorized Deduplication

Authors(2) :-Parvati R. Shahu, Prof. Gurudev B. Sawarkar

Data Deduplication is a strategy for diminishing the measure of storage room an association needs to spare its data. In many associations, the capacity frameworks contain duplicate duplicates of many bits of data. For instance, various clients might spare a similar record in a few better places, or at least two documents that aren't indistinguishable may in any case incorporate a great part of similar data. Deduplication dispenses with these additional duplicates by sparing only one duplicate of the data and supplanting alternate duplicates with pointers that lead back to the first duplicate. Organizations every now and again utilize Deduplication in reinforcement and calamity recuperation applications; however, it can be utilized to free up space in essential stockpiling also. To dodge this duplication of data and to keep up the classification in the cloud we utilizing the idea of Hybrid cloud. To ensure the privacy of touchy data while supporting Deduplication, the joined encryption strategy has been proposed to encrypt the data before outsourcing. To better ensure data security, this paper makes the principal endeavor to formally address the issue of authorized data Deduplication.

Authors and Affiliations

Parvati R. Shahu
Department of Computer Science & Engineering, V. M. Institute Of Engineering & Technology, Nagpur , Madhya Pradesh, India
Prof. Gurudev B. Sawarkar
Department of Computer Science & Engineering, V. M. Institute Of Engineering & Technology, Nagpur , Madhya Pradesh, India

Deduplication, Authorized Duplicate Check, Confidentiality, Hybrid Cloud

  1. C. Ng and P. Lee. Revdedup: A reverse deduplication storage system optimized for reads to latest backups. In Proc. of APSYS,Apr 2013.
  2. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013.
  3. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure datadeduplication scheme for cloud storage. In Technical Report, 2013.
  4. J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In ASIACCS,pages 195206, 2013.
  5. J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.
  6. K. Zhang, X. Zhou, Y. Chen, X.Wang, and Y. Ruan. Sedic: privacy aware data intensive computing on hybrid clouds. In Proceedings of the 18th ACM conference on Computer and communications security,CCS’11, pages 515526, New York, NY, USA, 2011. ACM.
  7. M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
  8. M. Bellare, S. Keelveedhi, and T. Ristenpart. Messagelocked encryption and secure deduplication. In EUROCRYPT, pages 296312, 2013.
  9. M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data deduplication. In Proc. of StorageSS, 2008.
  10. P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.
  11. R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 8182. ACM, 2012.
  12. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC2011), 2011.
  13. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491500. ACM, 2011.
  14. W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441 446. ACM, 2012.
  15. Z. Wilcox-O’Hearn and B. Warner. Tahoe: the leastauthority filesystem. In Proc. of ACM StorageSS, 2008.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 60-65
Manuscript Number : CSEIT1723335
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Parvati R. Shahu, Prof. Gurudev B. Sawarkar, "An Implementation of Hybrid Cloud Approach for Secure Authorized Deduplication", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.60-65, July-August.2017
URL : http://ijsrcseit.com/CSEIT1723335

Follow Us

Contact Us