Open Access   Article Go Back

Secure Authorized Deduplication Based on Hybrid Cloud Approach

J. Suresh1 , S. Jhansi Rani2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-10 , Page no. 1-5, Oct-2015

Online published on Oct 31, 2015

Copyright © J. Suresh , S. Jhansi Rani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Suresh , S. Jhansi Rani, “Secure Authorized Deduplication Based on Hybrid Cloud Approach,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.1-5, 2015.

MLA Style Citation: J. Suresh , S. Jhansi Rani "Secure Authorized Deduplication Based on Hybrid Cloud Approach." International Journal of Computer Sciences and Engineering 3.10 (2015): 1-5.

APA Style Citation: J. Suresh , S. Jhansi Rani, (2015). Secure Authorized Deduplication Based on Hybrid Cloud Approach. International Journal of Computer Sciences and Engineering, 3(10), 1-5.

BibTex Style Citation:
@article{Suresh_2015,
author = {J. Suresh , S. Jhansi Rani},
title = {Secure Authorized Deduplication Based on Hybrid Cloud Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {1-5},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=693},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=693
TI - Secure Authorized Deduplication Based on Hybrid Cloud Approach
T2 - International Journal of Computer Sciences and Engineering
AU - J. Suresh , S. Jhansi Rani
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 1-5
IS - 10
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2807 2577 downloads 2428 downloads
  
  
           

Abstract

Data de-duplication is a data compression technique which is used to eliminate the duplicates for the repeated data. It is been extensively used in the cloud storage to minimize the amount of storage size and save maximum bandwidth. The convergent technique is been suggested, to encrypt the data before outsourcing to protect the confidentiality for the sensitive data while using de-duplication. In order to provide better data security, a hybrid cloud is been proposed. A hybrid cloud is a combination of private cloud and public cloud bound together. Private cloud is a place where some critical activities can be performed like security, setting the privileges to the users, setting the token number etc. whereas the public cloud is a place where some noncritical activities are performed like outsourcing an encrypted file. This paper formally addresses authorization with data de-duplication; we present several new de-duplications supporting the authorized duplicate check in the hybrid cloud architecture. In this paper we attempt to address the authorized de-duplication check, combined with convergent encryption for providing the better security to the sensitive data using the hybrid cloud architecture.

Key-Words / Index Term

Deduplication; authorized duplicate check; confidentiality; hybrid cloud

References

[1] Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart “Dupless: Server-Aided Encryption for Deduplicated Storage”, SEC'13 Proceedings of the 22nd USENIX conference on Security, ISBN: 978-1-931971-03-4, Pages 179-194, USENIX Association Berkeley, CA, USA ©2013.
[2] Paul Anderson and Le Zhang, “Fast and secure laptop backups with encrypted de-duplication”, LISA'10 Proceedings of the 24th international conference on Large installation system administration, Article No. 1-8, USENIX Association Berkeley, CA, USA ©2010.
[3] Shweta Pochhi and Vanita Babanne,”A Survey on Secure and Authorized Data Deduplication”, International Journal of Science and Research (IJSR),Volume 3 Issue 11, November 2014.
[4] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, P. Lee, and Wenjing Lou “Secure deduplication with efficient and reliable convergent key management”, IEEE Transactions on Parallel and Distributed Systems (TPDS), volume:25, Issue 6 2014.
[5] Shai Halevi, Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg, “Proofs of ownership in remote storage systems”, CCS '11 Proceedings of the 18th ACM conference on Computer and communications security, ISBN: 978-1-4503-0948-6, Pages 491-500, ACM New York, NY, USA ©2011.
[6] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing”, In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
[7] NIST’s Policy on Hash Functions, Available: http://csrc.nist.gov/groups/ST/hash/policy.html [Online]., Sept. 2012.
[8] D. Meister and A. Brinkmann, “Multi-Level Comparison of Data Deduplication in a Backup Scenario”, SYSTOR '09 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, ISBN: 978-1-60558-623-6, Article No. 8, ACM New York, NY, USA ©2009.
[9] J.S. Plank and L. Xu, “Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications”, in Proc. 5th IEEE Int’l Symp. NCA, Cambridge, MA, USA, July 2006, pp.173-180.
[10] M.O. Rabin, “Fingerprinting by Random Polynomials”, Center for Research in Computing Technology, Harvard University, Cambridge, MA, USA, Tech. Rep. TR-CSE-03-01, 1981.
[11] M.O. Rabin, “Efficient Dispersal of Information for Security, Load Balancing, Fault Tolerance”, J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
[12] A. Rahumed, H.C.H. Chen, Y. Tang, P.P.C. Lee, and J.C.S. Lui, “A secure Cloud Backup System with Assured Deletion and Version Control”, In Proc. 3rd Int’l Workshop Security Cloud Computing, pp. 160-167, 2011.
[13] A.D. Santis and B. Masucci, “Multiple Ramp Schemes”, IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1720-1728, July 1999.
[14] M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, “Secure Data Deduplication”, in Proc. StorageSS, pp. 1-10, 2008.
[15] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou “A Hybrid Cloud Approach for Secure Authorized De-duplication”, in vol: pp no-99, IEEE, 2014.
[16] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system”, In ICDCS, pages 617–624, 2002.
[17] D. Ferraiolo and R. Kuhn, “Role-based access controls”, In 15th NIST-NCSC National Computer Security Conf., 1992.
[18] V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Page No : 120-125, Volume-02 , Issue-11, E-ISSN: 2347-2693, Nov -2014.