Enhanced Authorized Deduplication check and providing data confidentiality in Twin cloud

M Vamsi Krishna, G Rajasekhar, K Satyanarayana


Cloud computing giving pooled assets as a support of diverse clients through web in different models. The primary administration of cloud is information stockpiling. Clients putting away the information in cloud by some helpful elements like sharing, benefits and get to rights. Be that as it may, the issue is expanded volumes of information devouring more storage room. Information deduplication is novel method which kills Duplicate information to give classification along deduplication check prior approved information deduplication and focalized encryption system is utilized. In any case, past deduplication frameworks can't bolster differential approval copy check. We present twin cloud mix of open and private cloud to bolster more grounded security by encoding the record with differential benefit keys. Along these lines, the clients without relating benefits can't perform the copy check. Besides, such unapproved clients can't decode the ciphertext even plot with the S-CSP. At long last our proposed model is secured and gives secrecy.


Deduplication, authorized duplicate check, confidentiality, hybrid cloud.


R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and

Communications Security, pages 81–82. ACM, 2012.

S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.

A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S.Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud

Computing, 2011.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman.Role-based access control models. IEEE Computer, 29:38–47, Feb1996.

J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In Technical Report, 2013.

M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data deduplication. In Proc. of StorageSS, 2008.

Z. Wilcox-O’Hearn and B. Warner. Tahoe: the least-authority file system. In Proc. of ACM StorageSS, 2008.

J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In ASIACCS, pages 195–206, 2013.

J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.

K. Zhang, X. Zhou, Y. Chen, X.Wang, and Y. Ruan. Sedic: privacyawaredata intensive computing on hybrid clouds. In Proceedings of the 18th ACM conference on Computer and communications security, CCS’11, pages 515–526, New York, NY, USA, 2011. ACM.

Open SSL Project. http://www.openssl.org/.

P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraidedencryption for deduplicated storage. In USENIX Security Symposium, 2013.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.

M. Bellare, C. Namprempre, and

G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.

Full Text: PDF [FULL TEXT]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.