Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Authorized Deduplication in Hybrid Cloud with Public Auditing

J. Dhivya, R. Santhosh

Abstract


In a cloud computing environment, there is an increasing amount of storage and network in the cloud system. Cloud storage enables the individuals and organizations outsource their storage data at a lower cost. Based on increasing number of users, the data stored on the cloud will also be increasing day by day. The critical challenge of cloud storage is to manage the continuous increasing amount of data. Deduplication in cloud computing takes an important role in cloud structure. It will be used to remove the multiple copies of data in a dataset and then holds only the unique data. To protect the data security, first formally address the problem in authorized deduplication. The traditional encryption techniques secure the user’s sensitive data. To provide the data confidentiality to the user’s outsourced data which is stored on the public cloud convergent encryption technique has been used. In this paper provides the secure authorized duplication with public auditing for large number of files and conduct test bed experiments using our prototype.


Keywords


Deduplication, Hybrid Cloud, Authorized Duplicate Check, Confidentiality, Auditing.

Full Text:

PDF

References


M. W. Storer, K.Greenan, D. D. E. Long, and E. L. Miller, 2008, “Secure data deduplication”. In Proc. of storage SS.

J. Yuan and S. Yu, 2013, “Secure and Efficient Proof of Storage with Deduplication”. IACR Cryptography ePrint Achieve, 2013:149.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman Peleg, 2011, “Proofs of ownership in remote storage systems”. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on computer and Communications Security, pages 491-500.

R. D. Pietro and A. Sorniotti, 2012, “Boosting efficiency and security in proof of ownership for deduplication”. In H.Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81-82.

Prajakta Patil, Anilkumar Warad. “A survey on data deduplication techniques”. Int. J. Computer Technology & Applications, Vol 5(6), 1964-1967.

Jin Li, Yan Kit Lit, Xiao feng Chen, Patrick P.C. Lee, and Wenjing Lou, 2014, “A Hybrid Cloud Approach For Secure Authorized Deduplication”. In IEEE Transactions on Parallel and Distributed Systems.

K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, 2011, “Sedic: Privacy aware data intensive computing on Hybrid clouds”. In Proceedings of the 18th ACM conference on Computer and communications security, CCS’11, pages 515-526, New York, NY, USA, ACM.

Sharma Bharat, Mandre B. R., 2015, “A Secured and Authorized Data Deduplication in Hybrid cloud with public auditing”. International journal of computer applications (0975-8887) volume 120-no.16.

Jiawei Yuan, Shucheng Yu, 2012, “Secure and Constant Cost Public Cloud Storage Auditing with Deduplication”, Department of Computer Science University of Arkansas at Little Rock, USA Email:sxyul@ualr.edu

Crypto packages Java. [Online]. http://docs.oracle.com/javase/7/docs/api/javax/crypto/package-summary.html

CLOUDS. [Online]. http://www.cloudbus.org/cloudsim/


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.