An Implementation of Hybrid Cloud Approach for Secure Authorized Deduplication

Authors

  • Parvati R. Shahu  Department of Computer Science & Engineering, V. M. Institute Of Engineering & Technology, Nagpur , Madhya Pradesh, India
  • Prof. Gurudev B. Sawarkar  Department of Computer Science & Engineering, V. M. Institute Of Engineering & Technology, Nagpur , Madhya Pradesh, India

Keywords:

Deduplication, Authorized Duplicate Check, Confidentiality, Hybrid Cloud

Abstract

Data Deduplication is a strategy for diminishing the measure of storage room an association needs to spare its data. In many associations, the capacity frameworks contain duplicate duplicates of many bits of data. For instance, various clients might spare a similar record in a few better places, or at least two documents that aren't indistinguishable may in any case incorporate a great part of similar data. Deduplication dispenses with these additional duplicates by sparing only one duplicate of the data and supplanting alternate duplicates with pointers that lead back to the first duplicate. Organizations every now and again utilize Deduplication in reinforcement and calamity recuperation applications; however, it can be utilized to free up space in essential stockpiling also. To dodge this duplication of data and to keep up the classification in the cloud we utilizing the idea of Hybrid cloud. To ensure the privacy of touchy data while supporting Deduplication, the joined encryption strategy has been proposed to encrypt the data before outsourcing. To better ensure data security, this paper makes the principal endeavor to formally address the issue of authorized data Deduplication.

References

  1. C. Ng and P. Lee. Revdedup: A reverse deduplication storage system optimized for reads to latest backups. In Proc. of APSYS,Apr 2013.
  2. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013.
  3. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure datadeduplication scheme for cloud storage. In Technical Report, 2013.
  4. J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In ASIACCS,pages 195–206, 2013.
  5. J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.
  6. K. Zhang, X. Zhou, Y. Chen, X.Wang, and Y. Ruan. Sedic: privacy aware data intensive computing on hybrid clouds. In Proceedings of the 18th ACM conference on Computer and communications security,CCS’11, pages 515–526, New York, NY, USA, 2011. ACM.
  7. M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
  8. M. Bellare, S. Keelveedhi, and T. Ristenpart. Messagelocked encryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
  9. M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data deduplication. In Proc. of StorageSS, 2008.
  10. P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.
  11. R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.
  12. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC2011), 2011.
  13. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.
  14. W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441– 446. ACM, 2012.
  15. Z. Wilcox-O’Hearn and B. Warner. Tahoe: the leastauthority filesystem. In Proc. of ACM StorageSS, 2008.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Parvati R. Shahu, Prof. Gurudev B. Sawarkar, " An Implementation of Hybrid Cloud Approach for Secure Authorized Deduplication, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.60-65, July-August-2017.