Secure Deduplication Technique for Privilege Data Access Using Hybrid Cloud

Priyanka Vajja, Gopala Krishna J S V

Abstract


Cloud is moderated technology in now a days but this type of technology is failure in many times. Cloud computing having secure and confidential problems because of  data irretrievability. So we are   deliberate on faithful information. In this time the technology is focus on duplicate copies. The major idea is  we did not accept any duplicate copy like same name of file are same content of file. Then we are successfully  gain needed data on cloud     Data deduplication is a demanding technology to support dispose of redundant information as an option of enthralling records; it provisions simply distinct copy of file. Together with the whole associations reposting and numerous associations encase more bits of copy in sequence. Holder in point different clients stores corresponding documents in a few preferred spaces. Deduplication abolish the extra duplicates by trimming the  duplicate  data and restore alternate duplicates alongside pointers that flipside to the first duplicate. It represents the information pressure procedure to build the data transfer capacity proficiency. Data deduplication is tremendously utilizing as a part of distributed computing currently. Data deduplication protects the privacy of touchy data. It lives Up to expectations with merged encryption system to scramble the information before convey. Administrations frequently utilize

 

 

Deduplication technique for reinforcement and disaster recuperation functions. Here  We attempt to accept the deduplication technique, to assemble with simultaneous encryption to supervise the cost of security for sensitive information with half and half distributed computing.

Keywords


Deduplication, authorized duplicate check, confidentiality, hybrid cloud.

References


OpenSSL Project. http://www.openssl.org/.

P. Anderson and L. Zhang. Fast and secure laptop backups with

encrypted de-duplication. In Proc. of USENIX LISA, 2010.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided

Encryption for deduplicated storage. In USENIX Security

Symposium, 2013.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked

encryption and secure deduplication. In EUROCRYPT, pages 296–

, 2013.

M. Bellare, C. Namprempre, and G. Neven. Security proofs for

identity-based identification and signature schemes. J. Cryptology,

(1):1–61, 2009.

M. Bellare and A. Palacio. Gq and schnorr identification schemes:

Proofs of security against impersonation under active and concurrent

attacks. In CRYPTO, pages 162–177, 2002.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin

clouds: An architecture for secure cloud computing. In Workshop

on Cryptography and Security in Clouds (WCSC 2011), 2011.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.

Reclaiming space from duplicate files in a serverless distributed

file system. In ICDCS, pages 617–624, 2002.

D. Ferraiolo and R. Kuhn. Role-based access controls. In 15th

NIST-NCSC National Computer Security Conf., 1992.

GNU Libmicrohttpd. http://www.gnu.org/software/libmicrohttpd/.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of

ownership in remote storage systems. In Y. Chen, G. Danezis,

and V. Shmatikov, editors, ACM Conference on Computer and

Communications Security, pages 491–500. ACM, 2011.

J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication

with efficient and reliable convergent key management. In IEEE

Transactions on Parallel and Distributed Systems, 2013.

libcurl. http://curl.haxx.se/libcurl/.

C. Ng and P. Lee. Revdedup: A reverse deduplication storage

system optimized for reads to latest backups. In Proc. of APSYS,

Apr 2013.

W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication

protocols in cloud storage. In S. Ossowski and P. Lecca, editors,

Proceedings of the 27th Annual ACM Symposium on Applied Computing,

pages 441–446. ACM, 2012.

R. D. Pietro and A. Sorniotti. Boosting efficiency and security

in proof of ownership for deduplication. In H. Y. Youm and

Y. Won, editors, ACM Symposium on Information, Computer and

Communications Security, pages 81–82. ACM, 2012.

S. Quinlan and S. Dorward. Venti: a new approach to archival

storage. In Proc. USENIX FAST, Jan 2002.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.