A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud

Shaik Mahammad Irfan, Md. Amanatulla

Abstract


Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockpiling use furthermore be connected to network information exchanges to diminish the quantity of bytes that must be sent. Keeping numerous information duplicates with the comparative substance, de-duplication disposes of excess information by keeping one and only physical duplicate and allude other repetitive information to that duplicate. Information de-duplication happens document level and also square level. The copy duplicates of indistinguishable document take out by record level de-duplication. For the piece level duplication which takes out copies squares of information that happen in non-indistinguishable records. In spite of the fact that information deduplication takes a great deal of advantages, security, and in addition protection concerns, emerges as client's delicate information are able to both insider and outcast assaults. In the conventional encryption giving information privacy, is opposing with information de-duplication. To keep up trustworthiness we are giving the Third Party Auditor plot which makes the review of the record put away at cloud and advises the information proprietor about document status put away at cloud server. This framework underpins security difficulties, for example, an approved copy check, honesty, information classification and unwavering quality. In this paper new disseminated deduplication frameworks with higher dependability in which the information lumps are circulated over different cloud servers is being proposed.


References


J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer,“Reclaiming space from duplicate files in a server less distributed file system.” in ICDCS, 2002, pp. 617–624.

M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data deduplication,” in Proc. of StorageSS, 2008.

P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de- duplication,” in Proc. of USENIX LISA, 2010

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Server aided encryption for deduplicated storage,” in USENIX Security Symposium, 2013.

Science, IEEE, 1997.Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, IEEE Transactions on Parallel and Distributed Systems, Volume: PP, Issue:99, Date of Publication :18.April.2014.

“Message-locked encryption and secure deduplication,” in EUROCRYPT, 2013, pp. 296–312.

G. R. Blakley and C. Meadows, “Security of ramp schemes,” in Advances in Cryptology: Proceedings of CRYPTO ‟84, ser. Lecture Notes in Computer Science, G. R. Blakley and D. Chaum, Eds. Springer-Verlag Berlin/Heidelberg, 1985, vol. 196, pp. 242–268.

A. D. Santis and B. Masucci, “Multiple ramp schemes,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1720–1728, Jul. 1999. [9] M. O. Rabin, “Efficient dispersal of information for security, load balancing, and fault tolerance,” Journal of the ACM, vol. 36, no. 2, pp. 335– 348, Apr. 1989.

A. Shamir, “How to share a secret,” Commun.ACM, vol. 22, no. 11, pp. 612–613, 1979.

J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615–1625.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems.” in ACM Conference on Computer and Communications Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500.

J. S. Plank, S. Simmerman, and C. D. Schuman, “Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2,” University of Tennessee, Tech. Rep. CS-08-627, August 2008. [14] J. S. Plank and L. Xu, “Optimizing Cauchy Reed-solomon Codes for fault-tolerant network storage applications,” in NCA-06: 5th IEEE International Symposium on Network Computing Applications, Cambridge, MA, July 2006.

C. Liu, Y. Gu, L. Sun, B. Yan, and D. Wang, “R-admad: High reliability provision for large-scale de-duplication archival storage systems,” in Proceedings of the 23rd international conference on Supercomputing, pp. 370–379.

M. Li, C. Qin, P. P. C. Lee, and J. Li, “Convergent dispersal: Toward storage-efficient security in a cloud-of-clouds,” in The 6th USENIX Workshop on Hot Topics in Storage and File Systems, 2014.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.