CFP last date
22 April 2024
Reseach Article

Multimedia Data in Cloud Storage System using DE Duplication Verification

by Kotte Ajay, G. N. Beena Bethel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 12
Year of Publication: 2016
Authors: Kotte Ajay, G. N. Beena Bethel
10.5120/ijca2016911663

Kotte Ajay, G. N. Beena Bethel . Multimedia Data in Cloud Storage System using DE Duplication Verification. International Journal of Computer Applications. 149, 12 ( Sep 2016), 27-30. DOI=10.5120/ijca2016911663

@article{ 10.5120/ijca2016911663,
author = { Kotte Ajay, G. N. Beena Bethel },
title = { Multimedia Data in Cloud Storage System using DE Duplication Verification },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 12 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number12/26051-2016911663/ },
doi = { 10.5120/ijca2016911663 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:54:35.727752+05:30
%A Kotte Ajay
%A G. N. Beena Bethel
%T Multimedia Data in Cloud Storage System using DE Duplication Verification
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 12
%P 27-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Hybrid cloud is a concrescence of public plus private clouds bound together by either standardized or proprietorship technology that changes information plus diligence immovableness. Proposed system aiming to expeditiously resolving yequandary from deduplication on differential favors in remote location computing. A hybrid remote location structure lying of a populace remote location plus a person removed location plus ye information owners simply source their information storage by using world cloud while ye information operation is managed in private cloud. To build information management measurability in cloud computing, de-duplication has been an identical well-kenned technique recently is use. Deduplication dilutes your bandwidth requirements, hastens the data transfers, and it keeps your cloud storage needs to a minimum. Proposed system demonstrates several nascent deduplication formulas fortifying approved duplicate assure inside hybrid remote location structure. To hold ye privacy of information ye convergent encoding proficiency holds made up used to encrypt ye information afore source. Approved deduplication system support differential sanction duplicate check. As a proof of conception, a prototype is implemented in approved duplicate check scheme and conduct test bed experiments utilizing prototype, approved duplicate check scheme incurs minimal overhead compared to mundane operations.

References
  1. Bugiel, Sven, et al. "Twin clouds: Secure cloud computing with low latency." Communications and Multimedia Security. Springer Berlin Heidelberg, 2011.
  2. Anderson, Paul, and Le Zhang. "Fast and Secure Laptop Backups with Encrypted De-duplication." LISA. 2010.
  3. Bellare, Mihir, SriramKeelveedhi, and Thomas Ristenpart. "DupLESS: server-aided encryption for deduplicated storage." Proceedings of the 22nd USENIX conference on Security.USENIX Association, 2013.
  4. Bellare, Mihir, SriramKeelveedhi, and Thomas Ristenpart. "Message-locked encryption and secure deduplication."Advances in Cryptology–EUROCRYPT 2013.Springer Berlin Heidelberg, 2013.296-312.
  5. Bellare, Mihir, ChanathipNamprempre, and Gregory Neven. "Security proofs for identity-based identification and signature schemes." Journal of Cryptology 22.1 (2009): 1-61.
  6. M. Bellare, S. Keelveedhi, and T. Ristenpart.Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
  7. K. Zhang, X. Zhou, Y. Chen, X.Wang, and Y. Ruan.Sedic: privacyaware data intensive computing on hybrid clouds. In Proceedings of the 18th ACM conference on Computer and communications security, CCS’11, pages 515–526, New York, NY, USA, 2011. ACM.
  8. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg.Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

De-duplication Proof of possession Convergent encoding Key Management.