Protected Enable Deduplication using Hybrid Cloud Approach

Authors

  • S. Palani   Asst. Prof Depatrtment of Computer Applications Sri Venkateswara College of Engineering and Technology(Autonomous) Chittoor, Andhra Pradesh, India
  • M. Sai Yeswanth   MCA Scholar Department of Computer Applications Sri Venkateswara College of Engineering and Technology(Autonomous) Chittoor, Andhra Pradesh, India
  • S. Sanaulla  MCA Scholar Department of Computer Applications Sri Venkateswara College of Engineering and Technology(Autonomous) Chittoor, Andhra Pradesh, India

Keywords:

Deduplication, Hybrid cloud, Authorized duplicate check scheme.

Abstract

Data deduplication is one altogether necessary info compression techniques for eliminating duplicate copies of continuation info, and has been wide used in cloud storage to scale back the amount of house for storing and save information measure. In Existing System, we've got a bent to gift a phrase search technique supported Bloom filters that's considerably quicker than existing solutions, with similar or higher storage and communication value. Our technique uses a series of n-gram filters to support the quality. The theme exhibits a trade-off between storage and false positive rate, and is adjustable to defend against inclusion-relation attacks. how approach supported degree application’s target false positive rate is additionally delineate to higher defend data security, this paper makes the primary decide to formally address the matter of approved data deduplication. completely altogether entirely altogether completely fully totally different from ancient deduplication systems, the differential privileges of users are any thought of in duplicate check besides the info itself. We’ve a bent besides gift several new deduplication constructions supporting approved duplicate register a hybrid cloud vogue. Security analysis demonstrates that our theme is secure in terms of the definitions per the planned security model. As a whole of construct, we've got a bent to tend to implement an image of our projected approved duplicate check theme and conduct tested experiments victimization our image. We’ve got a bent to tend to purpose that our planned approved duplicate check theme incurs smallest overhead compared to ancient operations.

References

  1. M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. http://www.cse.ucsd.edu/users/mihir/crypto-research-papers.html, February 2004.
  2. M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. J. Cryptology, 16(3):185-215, June 2003.
  3. M. Bellare and A. Palacio. GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attack. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 162-177. Springer-Verlag, August 2002.
  4. K.G. Paterson. ID-based signatures from pairings on elliptic curves. Technical Report 2002/004, IACR ePrint Archive, January 2002.
  5. D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. J. Cryptology, 13(3):361-396, 2000.
  6. S. Saeednia and R. Safavi-Naini. On the security of girault’s identification scheme. In H. Imai and Y. Zheng, editors, PKC 1998, volume 1431 of LNCS, pages 149-153. Springer-Verlag, February 1998.
  7. R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. In SCIS 2000, Okinawa, Japan, January 2000.
  8. J. Stern, D. Pointcheval, J. Malone-Lee, and N.P. Smart. Flaws in applying proof methodologies to signature schemes. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 93-110. Springer-Verlag, August 2002.
  9. X. Yi. An identity-based signature scheme from the weil pairing. IEEE Communications Letters, 7(2):76-78, 2003.
  10. Shamir, A., 1979. How to Share a Secret, Commun.
  11. Clements, A.T., I. Ahmad, M. Vilayannur, and J. Li, ACM, 22(11): 612-613. 2009. Decentralized De duplication in San Cluster File 12Gnanamurthy, R.K., L. Malathi and M.K. Systems, in Proc.USENIX ATC, pp: Chandrasekaran, 2015. Energy efficient data collection through hybrid unequal clustering for wireless sensor networks, Computers & Electrical Engineering, 48: 358-370.
  12. F. Guo and P. Efstathopoulos. Building a high performance deduplication system. In Proc. USENIX ATC, Jun 2011.
  13. K. Jin and E.L. Miller. The effectiveness of deduplication on virtual machine disk images. In Proc. SYSTOR, May 2009.
  14. M. Kaczmarczyk, M. Barczynski, W. Kilian, and C. Dubnicki. Reducing impact of data fragmentation caused by in-line deduplication. In Proc. SYSTOR, Jun 2012.
  15. E. Kruus, C. Ungureanu, and C. Dubnicki. Bimodal content defined chunking for backup streams. In Proc. USENIX FAST, Feb 2010.
  16. S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.
  17. S. Rhea, R. Cox, and A. Pesterev. Fast, inexpensive contentaddressed storage in foundation. In Proc. USENIX ATC, Jun 2008.
  18. K. Srinivasan, T. Bisson, G. Goodson, and K. Voruganti. iDedup: Latency-aware, inline data deduplication for primary storage. In Proc. USENIX FAST, Feb 2012.
  19. B. Zhu, K. Li, and H. Patterson. Avoiding the disk bottleneck in the data domain deduplication file system. In Proc. USENIX FAST, Feb 2008

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
S. Palani ,M. Sai Yeswanth , S. Sanaulla, " Protected Enable Deduplication using Hybrid Cloud Approach, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.485-490, March-April-2018.