The cloud Approach for Consistent Appropriate deduplication

Alamuri Dheeraj, P Krishna Sai


In Cloud processing includes conveying gatherings of remote servers and programming systems that permit brought together information stockpiling and online access to PC administrations or assets. Mists can be named open, private or mixture. Cloud administration suppliers offer both exceedingly accessible capacity and hugely parallel registering assets at moderately low expenses. As Cloud computing gets to be pervasive, an expanding measure of information is being put away in the cloud and imparted by clients to indicated benefits, which characterize the entrance privileges of the put away information. One basic test of Cloud storage administrations is the administration of the constantly expanding volume of information. Datadeduplication is a particular information pressure strategy for wiping out copy duplicates of rehashing information. This method is utilized to enhance stockpiling usage and can likewise be connected to network information exchanges to diminish the quantity of bytes that must be sent and spare transmission capacity. To ensure the secrecy of delicate information while supporting deduplication, the merged encryption system is utilized to scramble the information before outsourcing. It encodes/unscrambles an information duplicate with a joined key, which is acquired by figuring the cryptographic hash estimation of the substance of the information duplicate. Focalized encryption permits the cloud to perform deduplication on the ciphertexts and the confirmation of possession keeps the unapproved client to get to the document. To improve the framework in security OAuth is utilized. OAuth (Open Authorization) is an open convention for token-construct confirmation and approval with respect to the Internet utilized as a part of half and half cloud to improve the security. OAuth empowers the framework to guarantee that the client is a verified individual or not. Just such confirmed client got the token for transferring and downloading in pubic cloud.


Data deduplication, Confidentiality, Hybrid cloud, Authorized Duplicate check, Authorization.


Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou” A Hybrid Cloud Approach for Secure Authorized De-duplication” in vol: pp no-99, IEEE, 2014

OpenSSL Project.

P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Messagelocked encryption and secure eduplication. In EUROCRYPT, pages 296– 312, 2013.

M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.

M. Bellare and A. Palacio. Gq and schnorr dentification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. chneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

D. Ferraiolo and R. Kuhn. Role-based access controls. In 15th NIST-NCSC National Computer Security Conf., 1992.

Full Text: PDF [FULL TEXT]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at