ESAD: An Efficient Secure Authorized Data Deduplication On Hybrid Cloud Storage Architecture

Kooragayala Sukeerthi, V.Anantha Lakshmi

Abstract


Deduplication is capable at moreover the file level or the block level which do left with duplicate obstruct of data that take place in non-identical files. Data deduplication is a paying attention data firmness system to do absent with duplicate mock-up of says yet again data in storage. The scheme is used to dig up superior storage consumption and preserve as well be realistic to network files relocate to decline the total of bytes that should be fling. As a substitute of continuation multiple data replica with the equivalent contented, deduplication abolish excess data by observance barely one objective copy and referring additional obsolete information with the aim of replica.

References


OpenSSL Project, (1998). [Online]. Available: http://www. openssl.org/

P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. 24th Int. Conf. Large Installation Syst. Admin., 2010, pp. 29–40.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179–194.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296–312.

M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,” J. Cryptol., vol. 22, no. 1, pp. 1–61, 2009.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.