Secure Data Duplication Checking with Backup Recovery in Big Data Environments

Authors

  • Gokulakrishnan V  Assistant Professor, Department of CSE, Dhanalakshmi Srinivasan Engineering College , Perambalur, Tamil Nadu, India
  • Illakiya B  Department of CSE, Dhanalakshmi Srinivasan Engineering College , Perambalur, Tamil Nadu, India

DOI:

https://doi.org/10.32628/CSEIT2064113

Keywords:

Symmetric Key Algorithm, Similarity Checking Algorithm, De-Duplication, Encryption Algorithms.

Abstract

With the rapidly increasing amounts of data produced worldwide, networked and multi- user storage systems are becoming very popular. However, concerns over data security still prevent many users from migrating data to remote storage. The conventional solution is to encrypt the data before it leaves the owner’s premises. While sound from a security perspective,this approach prevents the storage provider from effectively applying storage efficiency functions, such as compression and deduplication, which would allow optimal usage of the resources and consequently lower service cost. Client-side data deduplication in particular ensures that multiple uploads of the same content only consume network bandwidth and storage space of a single upload. Deduplication is actively used by a number of backup providers as well as various data services. In this project, we present a scheme that permits the storage without duplication of multiple types of files. And also need the intuition is that outsourced data may require different levels of protection. Based on this idea, we design an encryption scheme that guarantees semantic security for unpopular data and provides weaker security and better storage and bandwidth benefits for popular data. This way, data deduplication can be effective for popular data, whilst semantically secure encryption protects unpopular content. We can use the backup recover system at the time of blocking and also analyze frequent log in access system.

References

  1. D. T. Meyer, and W. J. Bolosky, “A study of practical deduplication,” Proc. USENIX Conference on File and Storage Technologies 2011
  2. W. K. Ng, W. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” Proc. ACM SAC’12, 2012.
  3. N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop on Cloud Computing Security, pp. 21–32, 2014.
  4. P. Anderson, L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” Proc. USENIX LISA, 2010.
  5. J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” IEEE Transactions on Parallel and Distributed Sytems, Vol. 25, No. 6, 2014.
  6. J. Li, Y. K. Li, X. Chen, P. Lee, and W. Lou, “A hybrid cloud approach for secure authorized deduplication,” IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 5, pp. 1206–1216, 2015.
  7. M. Bellare, S. Keelveedhi, T. Ristenpart, “DupLESS: Server aided encryption for deduplicated storage,” Proc. USENIX Security Symposium, 2013.
  8. M. Bellare, S. Keelveedhi, “Interactive message-locked encryption and secure deduplication,” Proc. PKC 2015, pp. 516–538, 2015.
  9. L. Mingqiang, C. Qin, P.P.C. Lee, and J. Li, “Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of- Clouds,” Proc. USENIX Conference on Hot Topics in Storage and File Systems, 2014.
  10. J. Li, X. Chen, X. Huang, S. Tang, Y. Xiang, M. Hassan, and A. Alelaiwi, “Secure Distributed Deduplication Systems with Improved Reliability,” IEEE Transactions on Computer, Vol. 64, No. 2, pp. 3569–3579,201

Downloads

Published

2020-08-30

Issue

Section

Research Articles

How to Cite

[1]
Gokulakrishnan V, Illakiya B, " Secure Data Duplication Checking with Backup Recovery in Big Data Environments" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 4, pp.561-566, July-August-2020. Available at doi : https://doi.org/10.32628/CSEIT2064113