A Theoretical Approach for Secure Authorized De-Duplication

Authors

  • Padma Punna  United Health Group Information Services Pvt. Ltd, India
  • Racha Suresh  United Health Group Information Services Pvt. Ltd, India

Keywords:

Hybrid, De-duplication, authorization, encryption, decryption, file, block, chunk.

Abstract

Cloud computing is one of the technology which can be implemented for the users who are unable to have their complete infrastructure, unable to manage the security features and storage systems. For all of those people cloud computing is one of the best alternatives so that they will pay for what they use. But cloud computing is having its own difficulties. Cloud service providers provide service to multiple clients simultaneously and all these clients will use the cloud infrastructure for doing their operations. As this is used by multiple users and huge amount of data will be placed on the cloud. Data which is storing in the cloud may gets duplicated because of storing the data by multiple users. To eliminate redundant storage of data necessary steps should be taken by the cloud service provider. To eliminate redundant data a new approach is used which known as de-duplication. De-duplication is the process of eliminating the duplicated data from the cloud storage and brings the cloud storage structure to the consistent storage stucture. In this paper I am concentrating on the de-duplication process. But before this, to gain the knowledge on the cloud systems, I had some sort of survey on cloud computing and its services. While doing the survey I gets motivated with the de-duplication concept and decided to work on that. De-duplication is mainly done with the compression techniques like encryption and decryption methods. The main problem is that after encryption we use to have cipher text and we can’t recognize what the data will be there in that and we are not even sure that data is duplicated or not. The process of de-duplication is applied after compressing the file and then it is encrypted and shared between the client and the service provider to even have the security for the data. In this paper I am proposig a new method for eliminating the duplicated data by providing the security to the data in the cloud storage

References

  1. AlexaHuth and James Cebula, 2011, Carnegie Mellon University. Produced or US CERT, a government organization. The Basics of Cloud Computing. Retrieved from https://www.us-cert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf<br>
  2. RajkumarBuyya, CheeShinYeo, SrikumarVenugopal, James Broberg, IvonaBrandic, 2008, Future Generation Computer Systems. Retrieved from http://www.buyya.com/papers/Cloud-FGCS2009.pdf<br>
  3. Saurabh Kumar Garg and RajkumarBuyya, Green Cloud computing and Environmental Sustainability. Retrieved from http://www.cloudbus.org/papers/Cloud-EnvSustainability2011.pdf<br>
  4. Naylor G. Bachiega, Henrique P. Martins, Roberta Spolon, Marcos A. Cavenaghi, Renata S. Lobato, AleardoManacero. Open Source Cloud Computing: Characteristics and an Overview. Retrieved from http://worldcomp-proceedings.com/proc/p2013/PDP3537.pdf<br>
  5. Wee Keong Ng, Yonggang Wen and Huafei Zhu. (2012). Private Data De-duplication Protocols in Cloud Storage. ACM, 9781450308571/ 12/03<br>
  6. Pasquale Puzio, RefikMolva, Melekonen, and Sergio Loureiro. (2014). Block-level De-duplication with Encrypted Data. Open Journal of Cloud Computing (OJCC) Volume 1, Issue 1, 10-18, ISSN 2199-1987<br>
  7. JiaXu, Ee-Chien Chang, and Jianying Zhou. (2013). Weak Leakage-Resilient Client-side De-duplication of Encrypted Data in Cloud Storage ∗. ACM 978-1-4503-1767-2/13/05. Retrieved from https://www.comp.nus.edu.sg/~changec/publications/2013_asiaccs.pdf<br>
  8. Danny Harnik, Alexandra Shulman-Peleg, and Benny Pinkas. (2013), Retrieved from http://www.pinkas.net/PAPERS/hps.pdf<br>
  9. Jan Stanek, Alessandro Sorniottiy, Elli Androulakiy, and Lukas Kencl. (2014). A Secure Data De-duplication Scheme for Cloud Storage. IBM Research, Retrieved from fc14.ifca.ai/papers/fc14_submission_5.pdf <br>
  10. Sun, Z., Shen, J., &amp; Yong, J. (2011). DeDu: Building a de-duplication storage system over cloud computing. Computer Supported Cooperative Work in Design (CSCWD), 2011 15th International Conference on, 348-355.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Padma Punna, Racha Suresh, " A Theoretical Approach for Secure Authorized De-Duplication, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.934-937, November-December-2017.