A Hybrid Cloud Scheme for Secured Permitted Deduplication

Authors(2) :-Renati Vinod Kumar Reddy, A Lizi

Providing the protection for the info within the cloud could be a important demand in currently each day. The protection for the info may be provided by victimisation the encrypting the info. This coding may be done by victimisation the key and this coding secret's exposed then the protection for our knowledge is a smaller amount. That the key maintenance ought to be important concern in cloud server. This key is going to be noted to solely approved users solely. Completely different knowledge house owners will store the various knowledge within the cloud. There is also likelihood of storing identical content within the cloud. Just in case the duplicate knowledge is keep within the knowledge we'll send a call for participation to the involved owner to get rid of duplicate knowledge to save lots of the cupboard space and information measure of the cloud server. .To better defend data security, this paper makes the first conceive to formally address the matter of commissioned data deduplication. Fully completely different from ancient deduplication systems, the differential privileges of users area unit additional thought of in duplicate check besides the information itself. We tend to tend to boot gift several new deduplication constructions supporting commissioned duplicate sign in a hybrid cloud style.

Authors and Affiliations

Renati Vinod Kumar Reddy
Department of MCA, RCR Institutes of Management & Technology, Tirupati, Andhra Pradesh, India
A Lizi
Assistant Professor, Department of MCA, RCR Institutes of Management & Technology, Tirupati, Andhra Pradesh, India

Deduplication, encryption, hybrid cloud.

  1. M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless:Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
  2. P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. Of USENIX LISA, 2010.
  3. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013.
  4. S. Halevi, D. Harnik, B. Pinkas, and A. ShulmanPeleg.Proofs of ownership in remote storage systems. In Y.Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.
  5. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed systems, 2013.
  6. C. Ng and P. Lee. Revdedup: A reverse deduplication storage system optimized for reads to latest backups. In Proc. of APSYS, Apr 2013.
  7. C.-K Huang, L.-F Chien, and Y.-J Oyang, "Relevant TermSuggestion in Interactive Web Search Based on ContextualInformation in Query Session Logs," J. Am.Soc. For Information science and Technology, vol. 54, no. 7, pp. 638-649, 2003.
  8. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider.Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
  9. W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441–446. ACM, 2012.
  10. R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H.Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and communications Security,pages 81–82. ACM.
  11. S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.
  12. A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud Computing, 2011.
  13. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E.Youman. Role-based access control models. IEEE Computer, 29:38–47, Feb 1996.
  14. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In Technical Report, 2013.
  15. Center Bo Wang, HongYu Xing "The Application of Cloud Computing in Education Informatization, Modern Educational Tech..." Computer Science and Service System (CSSS), 2011 International Conference on IEEE, 27-29 June 2011,978-1-4244-9762-1, pp 2673 – 2676
  16. Mell P. and Grance T., "The NIST Definition of Cloud Computing", vol 53, issue 6, 2009.
  17. A Platform Computing Whitepaper, enterprise cloud computing: Transforming IT. Viewed 13 March 201018Dooley B 2010, Architecture requirement of The Hybrid Cloud‟. Information Management Online, Viewed 10 February 2010. OpenSSL Project. http://www.openssl.org/.
  18. P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.
  19. M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Server- aided encryption for deduplicated storage. In USENIX Security Symposium, 2013.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1169-1173
Manuscript Number : CSEIT1833577
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Renati Vinod Kumar Reddy, A Lizi, "A Hybrid Cloud Scheme for Secured Permitted Deduplication", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1169-1173, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview