Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

An Approach for Secure Distributed Deduplication System

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Anita A. Kundgir, S. S. Hatkar
10.5120/ijca2017914940

Anita A Kundgir and S S Hatkar. An Approach for Secure Distributed Deduplication System. International Journal of Computer Applications 170(9):42-45, July 2017. BibTeX

@article{10.5120/ijca2017914940,
	author = {Anita A. Kundgir and S. S. Hatkar},
	title = {An Approach for Secure Distributed Deduplication System},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {170},
	number = {9},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {42-45},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume170/number9/28101-2017914940},
	doi = {10.5120/ijca2017914940},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In this paper we introduce a deduplication system with improved reliability. As we all know the cloud computing performs a number of operations on data. All commercial cloud service providers know that the users demand for huge amount of storage space because number of online operations. Deduplication is good thing to implement but it will not work on encrypted data because of conflict in encryption. As we know convergent encryption, where key is derived from the hash of data which is recovered by the same encryption key.to overcome from all such interrupts we need a secure system which will perform the deduplication. The system checks at block level as well as file level with assignment of tags. Digital libraries contains huge amounts of data. Most of the times while data storage the number of copies of the same data are stored, again and again, so to remove such duplicate data copies we need a Deduplication technique. The deduplication removes unnecessary data, but at the same time, it is beneficial if it retrieves it with more reliability. In this paper, we have studied various approaches to improve the reliability of data after removing duplicate copies in data storage. The use of such deduplication schemes also reduces the data transfer rate to upload and download data .The time consumption should be less which will effect on its accessibility.

References

  1. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems.” in ACM Conference on Computer and Communications Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500.
  2. Mihir. Bellare, Sriram. Keelveedhi, and T. Ristenpart, “Dupless: Server aided encryption for deduplicated storage,” in USENIX Security Symposium, 2013.
  3. “Secure deduplication with efficient and reliable convergent key management” by J. li,Chen, jingwei,parteic and W.Lou ,in IEEE 2013.
  4. “A Survey on Deduplication Scheme in Cloud Storage” of author Deepa D.,Revathi M.
  5. ” An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”in IEEE transactions in 2012 ,Author K. yang and X.jia.
  6. ”Fingerprinting by random polynomials”,by M. Rabin in 1981.
  7. ”How to share secret” by Adi Shamir in ACM commun.,1979.
  8. “Multiple Ramp schemes”,by A. santis and B.Masuci in IEEE Transactions july 1999.
  9. “Message Locked Encryption in secure deduplication”in Eurocrypt,2013.
  10. “A Secure data deduplication scheme for cloud storage” in technical Report, 2013 by J. Stanek, A. Sorniotti, Androulaki, kenel L.
  11. ”Efficient dispersal of information for security ,load balancing,fault tolerance” in ACM journal 1989,M.Rabin.
  12. “Reclaiming Space from Duplicate Files in a Serverless Distributed File System”. John R.Douceur, Atul Adya, William J. Bolosky, D.Simon, M. Theimer Microsoft .
  13. “A Survey on Data Deduplication in Cloud Storage Environment”, in IJSRET 2015.by Mani U.V., G. Mohan

Keywords

Cloud storage, Deduplication, Integrity; Secret Sharing Scheme, Message locked encryption.