CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

An Effective Data Reduction in a Twin Cloud Environment using an Authorized De-dup. Technique with DARE Scheme

by Rasika V. Gode, Rupali Dalvi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 1
Year of Publication: 2017
Authors: Rasika V. Gode, Rupali Dalvi
10.5120/ijca2017915057

Rasika V. Gode, Rupali Dalvi . An Effective Data Reduction in a Twin Cloud Environment using an Authorized De-dup. Technique with DARE Scheme. International Journal of Computer Applications. 172, 1 ( Aug 2017), 15-22. DOI=10.5120/ijca2017915057

@article{ 10.5120/ijca2017915057,
author = { Rasika V. Gode, Rupali Dalvi },
title = { An Effective Data Reduction in a Twin Cloud Environment using an Authorized De-dup. Technique with DARE Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 1 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 15-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number1/28215-2017915057/ },
doi = { 10.5120/ijca2017915057 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:10.303632+05:30
%A Rasika V. Gode
%A Rupali Dalvi
%T An Effective Data Reduction in a Twin Cloud Environment using an Authorized De-dup. Technique with DARE Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 1
%P 15-22
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data deduplication is the technique of reduction in the data which keeps only one physical copy and generates pointers to that copy for referencing other redundant data. To secure the confidentiality of sensitive data throughout deduplication, the convergent cryptography technique  is employed that encrypts the info  before uploading it onto the general public cloud.. In our paper, we present the deduplication-aware resemblance detection and elimination (DARE) scheme which supports authorization in twin cloud environment. This scheme uses a duplicate-adjacency information for resemblance detection where we have to consider any two data blocks to be similar only if their respective adjacent data blocks are duplicate. Our proposed system achieves deduplication on encrypted data with minimum overhead and also enhances the security by managing convergent keys. In addition our system also increases the security level by providing OTP validation technique to avoid unauthorized access to the cloud data.

References
  1. Wen Xia, Member, IEEE, Hong Jiang, Fellow, IEEE, Dan Feng, Member, IEEE, and Lei Tian, Senior Member, IEEE, DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduc-tion with Low Overheads, IEEE TRANSACTIONS ON COMPUTERS, VOL. 65, NO. 6, JUNE 2016.
  2. Zheng Yan, Senior Member, IEEE, Wenxiu Ding, Xixun Yu, Haiqi Zhu, and Robert H. Deng, Fellow, IEEE, Deduplication on Encrypted Big Data in Cloud, IEEE TRANSACTIONS ON BIG DATA, VOL. 2, NO. 2, APRIL-JUNE 2016.
  3. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, A Hybrid Cloud Approach for Secure Authorized De-duplication IEEE Transactions on Parallel and Distributed Systems: Volume:26. No. 5, MAY 2015.
  4. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013.
  5. A. Venish and K. Siva Sankar, Study of Chunking Algorithm in Data Deduplication Proceeding of the International Conference on Soft Computing System, ICSCS , Volume 2.
  6. JadapalliNandini, Rami reddyNavateja Reddy Implementation De-duplication System with Authorized Users International Research Journal of Engineering and Technology (IRJET), volume-2, Issue 3, June -15.
  7. Backialakshmi. N Manikandan. M Secured Authorized De-Duplication in Distributed System IJIRST International Jour-nal for Innovative Research in Science and Technology Volume 1 Issue 9 February 2015.
  8. Rajashree Shivshankar Walunj, 2, Deepali Anil Lande, 3, Nilam Shrikrushna Pansare, Secured Authorized Deduplication Based Hybrid Cloud, The International Journal Of Engineering And Science (IJES), Volume 3 , Issue 11.2014
  9. P. Shilane, M. Huang, G. Wallace, and W. Hsu, WAN optimized replication of backup datasets using stream-informed delta compression, in Proc. 10th USENIX Conf. File Storage Technol., Feb. 2012, pp. 4964.
  10. F. Douglis and A. Iyengar, “Application-specific delta-encoding via resemblance detection,” in Proc. USENIX Annu. Tech. Conf., General Track, Jun. 2003, pp. 113–126.
  11. P. Kulkarni, F. Douglis, J. D. LaVoie, and J. M. Tracey, “Redundancy elimination within large collections of files,” in Proc. USENIX Annu. Tech. Conf., Jun. 2012, pp. 59–7.
Index Terms

Computer Science
Information Sciences

Keywords

Data deduplication delta compression hybrid cloud tag generation performance evaluation storage system.