Implementing Secure Authorized Deduplication Technique in Hybrid Cloud
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Using the cloud resources optimally, like reducing the amount of storage space and saving bandwidth, is a challenging task. This can be highly achieved by adopting one of the important data compression techniques for eliminating duplicate copies of repeating data called data de-duplication, and has been widely used in cloud storage to. To protect the confidentiality of sensitive data while supporting de-duplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new de-duplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct test-bed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Authors and Affiliations
Padyala Anusha| M.Tech (CSE)& Department (CSE) Usha Rama College of Engineering and Technology, A.P., India, G. Syam Prasad| Head of the Department (CSE) Usha Rama College of Engineering and Technology, A.P., India
A Mobility Prediction Algorithm To Estimate The Contact Opportunities For Smartphone Users
The objective is to consent users to issue queries for content stored on other smart phones wherever in the network and to measure the chances of obtaining the information needed. We take for granted that smart phone...
Design of Smart Grid Using Interactive Home Automation and Security Based on Raspberry Pi Micro-Controller
Computerized innovation that takes into consideration two ways correspondence between the utility and its clients, and the detecting along the Transmission lines is the thing that makes the Grid Smart. Like the Intern...
A PWM Controlled IGBT based VSCS with a Battery Energy Storage System for an Isolated Wind-Hydro Hybrid System Using Cage Generators
This paper presents a Pulse Width Modulation (PWM) controlled Insulated Gate Bipolar Transistor (IGBT) based Voltage Source Converters (VSCs) with a battery energy storage system (BESS) for an isolated wind-hydro hybr...
The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols
The consequence of Vampire attacks on linkstate, distance-vector, source routing and geographic and beacon routing protocols as well as a logical ID-based sensor network routing protocol. Whereas this is by no means...
Sesimic Evaluation Of Multistoried Building With Ground Soft Story And With Infills By Using Etabs
Recent building codes for seismic design and evaluation in Europe and American feature performance based criteria that entail the estimation of inelastic response of the building due to seismic. These seismic demands...