Implementation of Repeated Data Elimination and Improving Security in HCloud

K.Devi Priyanka, D.Chandra Mouli

Abstract


Data deduplication is one of essential data weight methodologies for taking out duplicatescopies of repeating data, and has been for the most part used as a piece of circulated stockpiling to reduce the measure of storage space and extra exchange speed. To guarantee the mystery of fragile data while supporting deduplication, the centered encryption procedure has been proposed to encode the data before outsourcing. To better guarantee data security, this paper makes the essential attempt to formally address the issue of affirmed data deduplication.Not an incredible same as traditional deduplication systems, the differential advantages of customers are further considered in duplicate check other than the data itself. In this venture proposed approved copy check conspire alongside aes-256 piece calculation and also for information trustworthiness utilizing SHA1 calculation which diminishes overhead and improve the security.


References


OpenSSL Project, (1998). [Online]. Available: http://www.openssl.org/

P. Anderson and L. Zhang, “Fast and secure laptop backups withencrypted de-duplication,” in Proc. 24th Int. Conf. Large InstallationSyst. Admin., 2010, pp. 29–40.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraidedencryption for deduplicated storage,” in Proc. 22nd USENIXConf. Sec. Symp., 2013, pp. 179–194.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-lockedencryption and secure deduplication,” in Proc. 32nd Annu. Int.Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296–312.

M. Bellare, C. Namprempre, and G. Neven, “Security proofs foridentity-based identification and signature schemes,” J. Cryptol.,vol. 22, no. 1, pp. 1–61, 2009.

M. Bellare and A. Palacio, “Gq and schnorr identification schemes:Proofs of security against impersonation under active and concurrentattacks,” in Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol.,

, pp. 162–177.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twinclouds: An architecture for secure cloud computing,” in Proc.Workshop Cryptography Security Clouds, 2011, pp. 32–44.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M.Theimer, “Reclaiming space from duplicate files in a serverlessdistributed file system,” in Proc. Int. Conf. Distrib. Comput. Syst.,2002, pp. 617–624.

D. Ferraiolo and R. Kuhn, “Role-based access controls, ” in Proc.15th NIST-NCSC Nat. Comput. Security Conf., 1992, pp. 554–563.

GNU Libmicrohttpd, (2012). [Online]. Available: http://www.gnu.org/software/libmicrohttpd/


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.