Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Storage Deduplication Based on Cryptography Techniques

Vijaya Kumar S, T.K.P. Rajagopal, Seema Pillai

Abstract


In the present circumstances, numerous approaches are utilized for the removal of duplicating a copy for repeating data. One among the beneficial data compression approach is data de-duplication. It could minimize the significant amount ofspace for storageand also save the band widthwhen making use of cloud storage space. The security can be provided by confidentiality of the raw data files, although facilitating de-duplicated data files are encrypted by the proposed convergent encryption method before outsourcing. Problems authorized data file duplication takes account by the foremost attempt on this theme for a better protection of data. This is certainlydistinctive from the traditional duplication methods. In hybrid cloud framework, authorized duplicate check is strengthened by numerous modern duplication constructions.

Cite this Article
Vijaya Kumar S, Rajagopal TKP, Seema Pillai. Cloud Storage Deduplication Based on Cryptography Techniques. Journal of Advanced Database Management & Systems. 2016; 3(2): 1–8p.


Keywords


De-duplication data, hybrid cloud, convergent encryption, confidential, duplicate check

Full Text:

PDF

References


Jadapalli Nandhini, Rami Reddy Navateja Reddy. Implementation of Hybrid Cloud Approach for Secure Authorized Deduplication. International Research Journal of Engineering and Technology

(IRJET). Jun 2015; 2(3).

Gaurav Kakariya, Sonali Rangdale. A Hybrid Cloud Approach For Secure Authorized Deduplication. International Journal of Computer Engineering and Applications (IJCEA). Oct 2014; 8(1).

Jin Li, Yan Kit Li, Xiaofeng Chen, et al. A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Trans Parallel Distrib Syst. 2014.

Yuan J, Yu S. Secure and Constant Cost Public Cloud Storage Auditing with Deduplication. IACR Cryptology ePrint Archive. 2013; 149.

Li J, Chen X, Li M, et al. Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans Parallel Distrib Syst. 2013.

Bellare M, Keelveedhi S, Ristenpart T. Dupless: Server Aided Encryption for Deduplicated Storage. In USENIX Security Symposium. 2013.

Stanek J, Sorniotti A, Androulaki E, et al. A Secure Data Deduplication Scheme for Cloud Storage. Tech. Rep. IBM Research,

Zurich, ZUR 1308-022; 2013.

Li J, Chen X, Li M, et al. Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans Parallel Distrib Syst. 2013.

Stolfo Salvatore J, Malek Ben Salem, Keromytis Angelos D. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. IEEE Symposium on Security and Privacy Workshop (SPW). 2012.

Agrawal O, Kulkarni SS. Secure Deduplication and Data Security with Efficient and Reliable CEKM. IJAIEM Trans Parallel Distrib Syst. Nov 2014; 3(11).

GNUL. ibmicrohttpd. Http://www.gnu.org/software/l ibmicrohttpd/

Open SSL Project. http://www.openssl.org/.

libcurl. http://curl.haxx.se/libcurl/.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/