Secure Authorized Deduplication in Hybrid Cloud

IJCSEC Front Page

Abstract:
Many techniques being used for eliminating duplicate copies of repeating data, among this techniques one of the important data compression technique is data deduplication. Deduplication is widely used in cloud storage to save bandwidth and to reduce the amount of storage space. To protect the confidentiality of data along with deduplication convergent encryption technique is used before outsourcing. Problem of authorized data duplication formally addressed by the first attempt of this paper for better protection. This proposed system is different from the traditional duplication systems. For raised knowledge security this paper also present several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. My goal is to implement a paradigm of the planned licensed duplicate check theme and conduct a test bed experiment using this paradigm. In this paper I have analysed the existing hybrid cloud deduplication system.

Keywords: Text segmentation ,Type Detection, Typed terms, Knowledgebase, Concept Labelling

References:

  1. S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.
  2. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.
  3. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.
  4. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
  5. R. D. Pietro and A. Sorniotti . Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security2012.
  6. M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Server aided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
  7. W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S Ossowski and P. 2012.
  8. M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296– 312, 2013.
  9. M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.
  10. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou” A Hybrid Cloud Approach for Secure Authorized De-duplication” in vol: pp no-99, IEEE, 2014
  11. Shaik Rahamathunnisa Begam, Bachina Varsha, Nittala Swapna Suhasini. “Hybrid Cloud Approach for Efficient Secure Authorized Deduplication” in vol: 04 pages 1987-1992, IJITECH, 2016