Secure Data Deduplication System with Tag Consistency
Abstract
used today.In that clouding is done over large communication
network like internet and provide large storage space in all sector
like government agency ,private enterprises etc and also store personal data on cloud.But the most important problem in cloud is
that large amount of storage space is required and also duplicate
copies of data is store on cloud .There are many techniques which
is used for eliminating duplicate copies of repeating data .From
that one of the important technique is data deduplication . Data
de-duplication is specialized data compression techniques for
removing duplicate copies of repeating data and has been widely
used in cloud storage to reduce the amount of storage space
and save bandwidth. To protect the confidentiality of sensitive
data on cloud , the convergent encryption technique is used to
encrypt the data before outsourcing . In proposed system used
secrete sharing scheme.In that files are divided into number of
blocks called as shares and this shares store on the different
number of nodes.By using recover technique number of shares
are combine into single file. That means using this scheme provide
data security,confidentialty ,data reliability.
Full Text:
PDFReferences
M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided
encryption for deduplicated storage. In USENIX Security Symposium,
M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption
and secure deduplication. In EUROCRYPT, pages 296 312, 2013.
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of
ownership in remote storage systems. In Y. Chen, G. Danezis, and V.
Shmatikov, editors, ACM Conference on Computer and Communications
Security, pages 491500. ACM, 2011.
J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with
efficient and reliable convergent key management. In IEEE Transactions
on Parallel and Distributed Systems, 2013.
C. Ng and P. Lee. Revdedup: A reverse deduplication storage system
optimized for reads to latest backups. In Proc. of APSYS, Apr 2013.
S. Quinlan and S. Dorward. Venti: a new approach to archival storage.
In Proc. USENIX FAST, Jan 2002.
J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data
deduplication scheme for cloud storage. In Technical Report, 2013.
M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data
deduplication. In Proc. of StorageSS, 2008.
J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing
with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.
Reclaiming space from duplicate files in a serverless distributed file
system. In ICDCS, pages 617624, 2002.
Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. A
Hybrid Cloud Approach for Secure Authorized Deduplication
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology