Implementing Secure Authorized Deduplication Technique in Hybrid Cloud

Abstract

Using the cloud resources optimally, like reducing the amount of storage space and saving bandwidth, is a challenging task. This can be highly achieved by adopting one of the important data compression techniques for eliminating duplicate copies of repeating data called data de-duplication, and has been widely used in cloud storage to. To protect the confidentiality of sensitive data while supporting de-duplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new de-duplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct test-bed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

Authors and Affiliations

Padyala Anusha| M.Tech (CSE)& Department (CSE) Usha Rama College of Engineering and Technology, A.P., India, G. Syam Prasad| Head of the Department (CSE) Usha Rama College of Engineering and Technology, A.P., India

Keywords

Related Articles

An Advanced Control Strategy For Solar PV and Battery Storage Integration System

In this venture, another design of a three-level unbiased point-clasped (NPC) inverter that can coordinate solar photovoltaic (PV) with battery storage in a framework associated framework is proposed. The quality of t...

Ensuring The Integrity And Non-Transferability Of The Stp Proofs

We exhibit the Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP) plot.STAMP is intended for specially ad-hoc mobile clients producing area proofs for each other in a disseminated setting. In any case,...

Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements

The controlled induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, the information on the rotor speed is extracted...

A Novel Approach for Processing of Real Time Big Data for Machine Learning By Using Map reduce Paradigm

As of late Big Data and its investigation assuming overwhelming part in ideal stockpiling of semi or unstructured information and Decision making by utilizing mining systems and prescient examination. Particularly Re...

A High Speed Vedic Multiplier Using Different Compressors

A digital clock rate multiplier, divisor using variable point math which generates the output clock with almost zero occurrence error has been presented. The circuit has an uncontrolled multiplication and division fac...

Download PDF file
  • EP ID EP16546
  • DOI -
  • Views 313
  • Downloads 13

How To Cite

Padyala Anusha, G. Syam Prasad (2015). Implementing Secure Authorized Deduplication Technique in Hybrid Cloud. International Journal of Science Engineering and Advance Technology, 3(9), 438-442. https://europub.co.uk/articles/-A-16546