CFP last date
20 May 2024
Reseach Article

Encryption Approaches for Secure Deduplication in Cloud Environment

by Ketaki Ohale, Aparna Junnarkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 12
Year of Publication: 2016
Authors: Ketaki Ohale, Aparna Junnarkar
10.5120/ijca2016912498

Ketaki Ohale, Aparna Junnarkar . Encryption Approaches for Secure Deduplication in Cloud Environment. International Journal of Computer Applications. 155, 12 ( Dec 2016), 19-20. DOI=10.5120/ijca2016912498

@article{ 10.5120/ijca2016912498,
author = { Ketaki Ohale, Aparna Junnarkar },
title = { Encryption Approaches for Secure Deduplication in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 12 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number12/26656-2016912498/ },
doi = { 10.5120/ijca2016912498 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:01:04.303947+05:30
%A Ketaki Ohale
%A Aparna Junnarkar
%T Encryption Approaches for Secure Deduplication in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 12
%P 19-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital data is growing voluminously due to the development in cloud services. This evolution is motivating users to outsource their data storage to the third party cloud providers. It is important for cloud storage services to remove redundancy among the data they store. Pirated duplication causes the revenue loss and violation of Intellectual Property Rights granted to the content owners. So, to protect cloud data from getting duplicated, deduplication techniques are widely used in the cloud based systems. Different approaches for deduplication of this cloud multimedia like audio, images, videos are compared and studied. These methods for secure deduplication improve the storage utilization and save network bandwidth.

References
  1. Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang ,"Secure Distributed Deduplication Systems with Improved Reliability", IEEE Transactions On Computers Volume, Year:2015.
  2. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo,"BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication",IEEE Transactions on Information Forensics and Security, Volume: 10, Issue: 12, Dec 2015.
  3. Dharani P, Berlin M.A.,"Survey on Secret Sharing Scheme with Deduplication in Cloud Computing", IEEE 9th International Conference on Intelligent Systems and Control (ISCO),October 2015.
  4. J. Li, X. Chen, M. Li, J. Li, P. Lee and W. Lou, "Secure deduplication with efficient and reliable convergent key management," in IEEE Transactions on Parallel and Distributed Systems, 2014.
  5. M. Bellare, S. Keelveedhi, and T. Ristenpart, "Dupless: Serveraided encryption for deduplicated storage," in USENIX Security Symposium,2013.
  6. Mihir Bellare,Sriram Keelveedhi, Thomas Ristenpart, "Message-locked encryption and secure deduplication,"in EUROCRYPT ,2013.
  7. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer,"Reclaiming space from duplicate files in a serverless distributed file system." in ICDCS, 2002.
  8. A. D. Santis and B. Masucci, "Multiple ramp schemes," IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 17201728, Jul. 1999.
  9. G. R. Blakley and C. Meadows, "Security of ramp schemes," in Advances in Cryptology: Proceedings of CRYPTO 84, ser. Lecture Notes in Computer Science, G. R. Blakley and D. Chaum, Eds. Springer-Verlag Berlin/Heidelberg,vol. 196, pp. 242268,1989.
  10. M. O. Rabin, "Fingerprinting by random polynomials," Center for Research in Computing Technology, Harvard University, Tech. Rep. Tech. Report TR-CSE-03-01,1981.
  11. A. Shamir, ”How to share a secret”, Commun. ACM, vol. 22, no. 11, pp. 612613, 1979.
  12. M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, ”Secure data deduplication”, in Proc. of StorageSS, 2008.
  13. P. Anderson and L. Zhang, ”Fast and secure laptop backups with encrypted de-duplication”, in Proc. of USENIX LISA, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Convergent Encryption Intellectual Property Rights (IPR) Message Locked Encryption (MLE) Public Key Cryptography Ramp Secret Sharing Scheme (RSSS).