Implementing Secure Authorized Deduplication Technique in Hybrid Cloud
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Using the cloud resources optimally, like reducing the amount of storage space and saving bandwidth, is a challenging task. This can be highly achieved by adopting one of the important data compression techniques for eliminating duplicate copies of repeating data called data de-duplication, and has been widely used in cloud storage to. To protect the confidentiality of sensitive data while supporting de-duplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new de-duplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct test-bed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Authors and Affiliations
Padyala Anusha| M.Tech (CSE)& Department (CSE) Usha Rama College of Engineering and Technology, A.P., India, G. Syam Prasad| Head of the Department (CSE) Usha Rama College of Engineering and Technology, A.P., India
Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks
Ad hoc less power wireless networks are one of the current topics in the field of security and pervasive computing. Most of the research work done before for improving the security of the networks in this area is main...
An Efficient Pdp Scheme For Distributed Cloud Storage To Support Dynamic Scalability On Multiple Storage Servers
The confirmation examination without downloading makes it particularly important for large-size files and folders typically including many clients’ files to make sure whether these data have been tampered with or d...
Huddling For Anonymization Of Compacted And Disseminated Public Systems
Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the a...
A Novel Approach To Recognize Malicious Application In Face Book- FRAppE
Our key commitment is in creating FRAppEseemingly the main apparatus concentrated on recognizing malicious applications on Facebook. To create FRAppE, we utilize data gathered by watching the posting conduct of 111K...
Disk Resident Taxonomy Mining for Large Temporal Datasets
Mining patterns under constraints in large data is a significant task to advantage from the multiple uses of the patterns embedded in these data sets. It is obviously a difficult task because of the exponential growt...