A Review of Literature on Security and Data Deduplication In Cloud Computing

Authors

  • J. Selvam  Ph. D.Research scholar, Department of Computer Science, Maruthu pandiyar College of Arts & Science, Thanjavur, Tamilnadu, India
  • Dr. P. Srivaramangai  Associate Professor, Department of Computer Science, Maruthu pandiyar College of Arts & Science, Thanjavur. Tamilnadu, India

Keywords:

Cloud Computing, Data duplication, MD5, SHA-1,Bigdata

Abstract

Cloud computing is an internet technology that operates both internet and central remote servers to control the applications and data. Cloud computing refers to the delivery of storage capacity and computing as a service to a heterogeneous community of end-receivers. Nowadays, Cloud storage systems are popularly improving a technology basic and that provides highly available storage. Deduplication is a technique of removing or abolishing duplicate data or files from the database or storage. It has utilized within the cloud computing environment to reduce storage space and also minimize network bandwidth. Cloud storage service providers like Amazon, Dropbox and others perform de-duplication process to reduce space allocation by storing only individual copy of each file uploaded. A Detailed review of Deduplication techniques is clearly presented in this paper.

References

  1. Deepavali Bhagwat, Kave Eshghi, Darrell D. E. Long,Mark Lillibridge,”Extreme Binning: Scalable, Parallel Deduplication for Chunk-based File Backup, 17th IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS’2009), London, UK, September 2009
  2.  G.Prashanthi, Z.Shobarani (2015), A Hybrid Cloud Approach for Secure Authorized Deduplication, International Journal of Innovative Research in Computer and Communication Engineering Vol.3, Special Issue 4.
  3.  BhushanChoudhary, Amit Dravid (2014), A Study on Authorized Deduplication Techniques in Cloud Computing, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 12.
  4. M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless:Server aided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
  5. Mark Lillibridge, Kave Eshghi, Deepavali Bhagwat, Vinay Deolalikar, Greg Trezise, and Peter Camble,”Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality”, 7th USENIX Conference on File and Storage Technologies
  6. C. Ng and P. Lee. Revdedup: A reverse deduplication storage system optimized for reads to latest backups. In Proc. of APSYS, Apr 2013.
  7. Wen Xia, Hong Jiang,Dan Feng,Lei Tian, “DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads”, information: DOI 10.1109/TC.2015.2456015, IEEE Transactions on Computers.
  8. Pasqualo Puzio, Refik Molva ,MelekOnen ,”CloudDedup: Secure Deduplication with Encrypted Data for Cloud Storage”, SecludIT and EURECOM,France.
  9. S. Keelveedhi, M. Bellare, and T. Ristenpart, ―Dupless: Serveraided encryption for deduplicated storage,‖ in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC’13. Washington, D.C.: USENIX Association, 2013, pp. 179–194. [Online]. Available:https://www.usenix.org/conference/usenixsecurity13/technicalsessions/presentation/bellare
  10. Wee Keong Ng, Yonggang Wen, Huafei Zhu,”Private Data deduplication Protocols in Cloud Storage”, SAC’12 March 2529, 2012, Riva del Garda, Italy.
  11. W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441–446. ACM, 2012.
  12. Iuon –Chang Lin, Po-ching Chien ,”Data Deduplication Scheme for Cloud Storage” International Journal of Computer and Control(IJ3C),Vol1,No.2(2012)
  13. Bugiel, S., N¨urnberger, S., Sadeghi, A.-R., Schneider,T.: Twin Clouds: An architecture for secure cloud computing (Extended Abstract). In: Workshop on Cryptography and Security in Clouds (WCSC 2011), March 15-16 (2011)
  14.  S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.
  15. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
  16. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A view of cloud computing,” Communication of the ACM, vol. 53, no. 4, pp.50–58, 2011.
  17. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, ―Proofs of ownership in remote storage systems,‖ in Proceedings of the 18th ACM Conference on Computer and Communications Security . ACM, 2011, pp. 491–500.
  18. Q. He, Z. Li, and X. Zhang, Data deduplication techniques, in International Conference on Future Information Technology and Management Engineering,pp.431-432,2010.
  19. P. Yuan and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.
  20. Z. Li, X. Zhang, and Q. He, Analysis of the key technology on cloud storage, in International Conference on Future Information Technology and Management Engineering, 2010, pp. 427428.
  21. D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side channels in cloud services: Deduplication in cloud storage. IEEE Security & Privacy, 8(6), 2010.
  22. Mohamed Adel Serhani, Chafik Bouhaddioui, Rachida Dssouli,” Big Data Quality: A Quality Dimensions Evaluation”,ResearchGate, DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0122
  23. P. Anderson and L. Zhang. “Fast and secure laptop backups with encrypted de-duplication”. In Proc. of USENIX LISA, 2010.
  24. K. Camble and E. Miller, "The effectiveness of deduplication on virtual machine disk images" In Proc. SYSTOR 2009: The Israeli Experimental Systems Conference..
  25. M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.
  26.  S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.
  27. Douceur JR, Adya A, Bolosky WJ, Simon D, Theimer M. ‘‘Reclaiming Space fromDuplicate Files in a Serverless Distributed File System,’’ in Proc. ICDCS, 2002, 617-624.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
J. Selvam, Dr. P. Srivaramangai, " A Review of Literature on Security and Data Deduplication In Cloud Computing , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.783-790, May-June-2018.