Secure Data Deduplication System with Tag Consistency

Ms.Vaishali Keshav Dhokne, Dr. Varsha Patil

Abstract


Cloud computing technique which is most widely
used today.In that clouding is done over large communication
network like internet and provide large storage space in all sector
like government agency ,private enterprises etc and also store personal data on cloud.But the most important problem in cloud is
that large amount of storage space is required and also duplicate
copies of data is store on cloud .There are many techniques which
is used for eliminating duplicate copies of repeating data .From
that one of the important technique is data deduplication . Data
de-duplication is specialized data compression techniques for
removing duplicate copies of repeating data and has been widely
used in cloud storage to reduce the amount of storage space
and save bandwidth. To protect the confidentiality of sensitive
data on cloud , the convergent encryption technique is used to
encrypt the data before outsourcing . In proposed system used
secrete sharing scheme.In that files are divided into number of
blocks called as shares and this shares store on the different
number of nodes.By using recover technique number of shares
are combine into single file. That means using this scheme provide
data security,confidentialty ,data reliability.

Full Text:

PDF

References


M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided

encryption for deduplicated storage. In USENIX Security Symposium,

M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption

and secure deduplication. In EUROCRYPT, pages 296 312, 2013.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of

ownership in remote storage systems. In Y. Chen, G. Danezis, and V.

Shmatikov, editors, ACM Conference on Computer and Communications

Security, pages 491500. ACM, 2011.

J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with

efficient and reliable convergent key management. In IEEE Transactions

on Parallel and Distributed Systems, 2013.

C. Ng and P. Lee. Revdedup: A reverse deduplication storage system

optimized for reads to latest backups. In Proc. of APSYS, Apr 2013.

S. Quinlan and S. Dorward. Venti: a new approach to archival storage.

In Proc. USENIX FAST, Jan 2002.

J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data

deduplication scheme for cloud storage. In Technical Report, 2013.

M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data

deduplication. In Proc. of StorageSS, 2008.

J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing

with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.

Reclaiming space from duplicate files in a serverless distributed file

system. In ICDCS, pages 617624, 2002.

Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. A

Hybrid Cloud Approach for Secure Authorized Deduplication


Refbacks

  • There are currently no refbacks.


 

Copyright © IJETT, International Journal on Emerging Trends in Technology