A Data De-duplication Procedure To Protect The Data Security

R.Bindu Madhavi, K.Satya Narayana Murthy

Abstract


Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidentiality, is unsuited with data deduplication. Particularly, traditional encryption necessitates different users to encrypt their data with their own keys. Thus, identical data copies of different users will escort to different cipher texts, manufacture deduplication impracticable. To superior guard data security, this paper makes the initial challenge to officially address the dilemma of authorized data deduplication. We implement a prototype of our proposed authorized duplicate check format and manner test bed experiments using our prototype.


References


OpenSSL Project, (1998). [Online]. Available: http://www.openssl.org/

P. Anderson and L. Zhang, “Fast and secure laptop backups withencrypted de-duplication,” in Proc. 24th Int. Conf. Large InstallationSyst. Admin., 2010, pp. 29–40.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraidedencryption for deduplicated storage,” in Proc. 22nd USENIXConf. Sec. Symp., 2013, pp. 179–194.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-lockedencryption and secure deduplication,” in Proc. 32nd Annu. Int.Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296–312.

M. Bellare, C. Namprempre, and G. Neven, “Security proofs foridentity-based identification and signature schemes,” J. Cryptol.,vol. 22, no. 1, pp. 1–61, 2009.

M. Bellare and A. Palacio, “Gq and schnorr identification schemesProofs of security against impersonation under active and concurrentattacks,” in Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol.,2002, pp. 162–177.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twinclouds: An architecture for secure cloud computing,” in Proc.Workshop Cryptography Security Clouds, 2011, pp. 32–44.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M.Theimer, “Reclaiming space from duplicate files in a serverlessdistributed file system,” in Proc. Int. Conf. Distrib. Comput. Syst.,2002, pp. 617–624.

D. Ferraiolo and R. Kuhn, “Role-based access controls, ” in Proc.15th NIST-NCSC Nat. Comput. Security Conf., 1992, pp. 554–563.

GNU Libmicrohttpd, (2012). [Online]. Available: http://www.gnu.org/software/libmicrohttpd/

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs ofownership in remote storage systems,” in Proc. ACM Conf. Comput. Commun. Security, 2011, pp. 491–500.

J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplicationwith efficient and reliable convergent key management,”in Proc. IEEE Trans. Parallel Distrib. Syst., http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.284, 2013.

libcurl, (1997). [Online]. Available: http://curl.haxx.se/libcurl/

C. Ng and P. Lee, “Revdedup: A reverse deduplication storagesystem optimized for reads to latest backups,” in Proc. 4th Asia-Pacific Workshop Syst., http://doi.acm.org/10.1145/2500727.2500731, Apr. 2013.

W. K. Ng, Y. Wen, and H. Zhu, “Private data deduplication protocolsin cloud storage,” in Proc. 27th Annu. ACM Symp. Appl. Comput.,2012, pp. 441–446.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.