CFP last date
22 April 2024
Reseach Article

Deduplication in Hybrid Cloud with Secure Data

by Ashwini Shete, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 8
Year of Publication: 2016
Authors: Ashwini Shete, B. M. Patil
10.5120/ijca2016911254

Ashwini Shete, B. M. Patil . Deduplication in Hybrid Cloud with Secure Data. International Journal of Computer Applications. 148, 8 ( Aug 2016), 32-36. DOI=10.5120/ijca2016911254

@article{ 10.5120/ijca2016911254,
author = { Ashwini Shete, B. M. Patil },
title = { Deduplication in Hybrid Cloud with Secure Data },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 8 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number8/25779-2016911254/ },
doi = { 10.5120/ijca2016911254 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:52:49.618025+05:30
%A Ashwini Shete
%A B. M. Patil
%T Deduplication in Hybrid Cloud with Secure Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 8
%P 32-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Deduplication is also called single instance technique, deduplication remove redundant data and stores original copy of data so it will saves the storage space to protect sensitive data. The data security and access to particular data is very much important in current days hence the features in deduplication have been widely used in cloud storage system. There was drawback in previous work where differential privileges of users are set permanently so any client can access any files which are not authorized to specific user. To overcome the drawback of the previous work, we are concentrated on client privileges which will grant or revoke the file access permissions to specific client. With deduplication technique, the client data is secured with advanced encryption algorithm rather than conventional encryption algorithm in hybrid cloud. In previous work convergent encryption technique was used with deduplication which does not provide the security to data. To better enhancement of the security of data, client has given specific permission to access the data, which is more enhanced security system for data security .Our simulation results shows that increase in security of data.

References
  1. P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. 24th Int. Conf. Large Installation.
  2. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179–194.
  3. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message- locked encryption and secure deduplication,” in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296–312.
  4. M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,” J. Cryptol. vol. 22, no. 1, pp. 1–61, 2009..
  5. Bugiel,SNurnberger,ASadeghian,T.Schneider,“Twinclouds: Anarchitectureforsecurecloudcomputing,”inProc.Workshop Cryptography Security Clouds, 2011
  6. A D. Ferraiolo and R. Kuhn, “Role-based access controls, ” in Proc. 15th NIST-NCSC Nat. Comput. Security Conf., 1992, pp. 554–563.
  7. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proc. ACM Conf. Comput. Commun. Securi
  8. C. Ng and P. Lee, “Revdedup: A reverse deduplication storage system optimized for reads to latest backups,” in Proc. 4t Asia-Pacific Workshop Syst., http://doi.acm.org/10.1145/2500727.2500731, Apr. 2013.
  9. W. K. Ng, Y. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” in Proc. 27th Annu. ACM Symp. Appl. Comput., 2012, pp. 441–446.
  10. J. Xu, E.-C. Chang, and J. Zhou, “Weak leakage-resilient clientside deduplication of encrypted data in cloud storage,” in Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security, 2013,pp. 195–206.
  11. J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” IACR Cryptology ePrint Archive, 2013:149, 2013.
  12. K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, “Sedic: Privacy-aware data intensive computing on hybrid clouds,” in Proc.18th ACM Conf. Comput. Commun. Security, 2011, pp. 515–526.
  13. Z. Wilcox-O’Hearn and B. Warner, “Tahoe: The least-authority filesystem,” in Proc. ACM 4th ACM Int. Workshop Storage Security Survivability, 2008, pp. 21–26.
  14. S. Quinlan and S. Dorward, “Venti: A new approach to archival storage,” in Proc. 1st USENIX Conf. File Storage Technol., Jan. 2002, p.7.
  15. R. D. Pietro and A. Sorniotti, “Boosting efficiency and security in proof of ownership for deduplication,” in Proc. ACM Symp. Inf.,Comput. Commun. Security, 2012, pp. 81–82.
  16. J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” in Proc. IEEE Trans. Parallel Distrib. Syst.,
  17. Libcurl, (1997). [Online]. Available: http://curl.haxx.se/libcurl
  18. A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,” in Proc. 3rd Int. Workshop Secutiry Cloud Comput., 2011, pp. 160–167.
  19. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, “A secure data deduplication scheme for cloud storage,” Tech. Rep. IBM Research, Zurich, ZUR 1308-022, 2013.
  20. M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data deduplication,” in Proc. 4th ACM Int. Workshop Storage Security Survivability, 2008, pp. 1–10.
  21. Z. Wilcox-O’Hearn and B. Warner, “Tahoe: The least-authority filesystem,” in Proc. ACM 4th ACM Int. Workshop Storage Security Survivability, 2008, pp. 21–26.
Index Terms

Computer Science
Information Sciences

Keywords

Deduplication Privileges Set Hybrid Cloud Conventional Encryption.