Implementing Secure Authorized Deduplication Technique in Hybrid Cloud

Abstract

Using the cloud resources optimally, like reducing the amount of storage space and saving bandwidth, is a challenging task. This can be highly achieved by adopting one of the important data compression techniques for eliminating duplicate copies of repeating data called data de-duplication, and has been widely used in cloud storage to. To protect the confidentiality of sensitive data while supporting de-duplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new de-duplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct test-bed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

Authors and Affiliations

Padyala Anusha| M.Tech (CSE)& Department (CSE) Usha Rama College of Engineering and Technology, A.P., India, G. Syam Prasad| Head of the Department (CSE) Usha Rama College of Engineering and Technology, A.P., India

Keywords

Related Articles

Empowering Elegant Cloud Services Owing To Remote Signification

We create cloud-helped remote detecting systems for empowering dispersed agreement estimation of obscure parameters in a given geographic range. We first propose an appropriated sensor system virtualization calculati...

Design Optimization of Catalytic Converter to Achieve Limited Back Pressure in Diesel Engine by using CFD

Presently a days the a dangerous atmospheric devation and air contamination are huge issue on the planet. The 70% of air contamination is because of outflows from an inner burning motor. The unsafe gasses like , NOX...

The paper proposes the current online multi-modal distance metric learning (OMDML) with another component of expansion to illuminate the Image equivocalness issue utilizing Conditional Random Field (CRF) Algorithm. T...

Gender and Name Classification Based on Texture, Local Binary Pattern and Probabilistic Neural Network

In different biometric applications, gender recognition from facial images plays an important role in various applications. This paper investigated Weber’s Local Descriptor for gender recognition which is a texture...

Scheduling Job Queue On Hadoop

Hadoop is a free, Java-based programming system that backings the preparing of vast informational collections in a Parallel and disseminated figuring condition. Enormous Data in many organizations are handled by Hado...

Download PDF file
  • EP ID EP16546
  • DOI -
  • Views 328
  • Downloads 13

How To Cite

Padyala Anusha, G. Syam Prasad (2015). Implementing Secure Authorized Deduplication Technique in Hybrid Cloud. International Journal of Science Engineering and Advance Technology, 3(9), 438-442. https://europub.co.uk/articles/-A-16546