A Fusion Cloud Method for Protected Authorised Deduplication
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
Data de-duplication is one of important data compression techniques for eliminating duplicate copies of same data, and has been used in area of cloud storage to reduce the amount of storage space and saving the more bandwidth. To protect the confidentiality of sensitive data while supporting de-duplication of files, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To protect the security of the data itself, the paper makes the first attempt to address the problem of authorized data de-duplication. Different from other de-duplication systems, the users are further considered in duplicate check besides the data. We also present several new de-duplication constructions supporting authorized duplicate check in fusion cloud architecture. Security analysis explains that our scheme is secure in terms of the definitions specified in the proposed security models. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct test bed experiments using our prototype concept. We show that our proposed authorized de-duplicate check scheme incurs minimal overhead compared to normal operations.
Authors and Affiliations
Chandragouda. B. H. , Prof. Anand. S. Uppar
Thermal Analysis of Radiator with Different Nano Fluids
The advancement in automobile technology is increasing day to day. The efficiency of the engine depends on heat transfer rate of radiator in automobile and further it relays on flow capacity of fluids and material used...
Seismic Response of Multi Storey RC Building with Friction Pendulum Bearing System
Buildings are very important after any natural hazards such as earthquake. The structural and nonstructural components are should repair and safe after earthquake. So to mitigate the effect of earthquake on the structur...
Comparison of Discrete and Smeared Cracks in the Dynamic Analysis of Concrete Gravity Dam
There are cracks in structures that can cause structural defects or reduce their useful life. Among the structures that examining cracks and their safety are of importance are concrete dams. There are two main methods t...
Mutual Authentication between IOT and Cloud Servers
Internet of Things (IoT) is an upcoming statement of belief where reference and communication technology connect multiple confined devices to the Internet for perfor ming idea exchange. Owing to the huge development abo...
Modeling data communication with NS3 simulator
there are many reasons that simulations are useful in the study and development of computer networks. For largescale networks, such as huge networks, deployments are expensive and cover very large areas, making simulatio...