Open Access Journal

ISSN : 2456-1304 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Science Engineering and Management (IJSEM)

Monthly Journal for Science Engineering and Management

ISSN : 2456-1304 (Online)

Authorized De-duplication of Data over Cloud

Author : Shaikh Basirat Tazin 1 S.D Pingle 2

Date of Publication :7th February 2018

Abstract: With a large number of users migrating towards cloud storage for storing their important data, data compression technique managing data stored over cloud had gained much importance. This technique removes duplicate copies of same data on a server and keeps only one copy. Again to protect data from attackers, data is encrypted using the linear congruential algorithm which employs convergent encryption concept. An authorized duplicate check is performed by users after encryption of data with help of generated tags. The file is uploaded if it is not already present otherwise POW is implemented. Hybrid cloud architecture is used with the public and private cloud, where public cloud stores all unique copies of data and private cloud manages authenticated access by maintaining privileges associated with file and users.

Reference :

    1.  P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication”, In Proc. of USENIX LISA, 2010.
    2.  M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Server-aided encryption for deduplicated storage”, In USENIX Security Symposium, 2013.
    3. Mr. Antony Xavier, Dr. V. Sai, Dr. S. P. Rajagopalan, “Enhanced De-key Approach to Reduce Data De-Duplication in Cloud Storage”, p. 5316-5320, 2016
    4. M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, “Secure Data Deduplication”, p. 1-10, 2008.
    5. D. Kim, S. Song, B. Choi, “Data deduplication for data optimization for storage and network systems.” p. 42-44, 2017
    6. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, “A secure data deduplication scheme for cloud storage,” Tech. Rep. IBM Research, Zurich, ZUR 1308-022, 2013

Recent Article