HYBRID CLOUD METHODOLOGY FOR SAFE APPROVED DEDUPLICATIONS

Thirumanikuppam Govindarajan Bhanurekha, Challa Bhaskar Rao

Abstract


Previous systems cannot support differential authorization duplicate check, in many applications. Inside the recent occasions, structural design was offered that made up of dual clouds for effective outsourcing of understanding in addition to arbitrary computations towards an untrustworthy commodity cloud. With the introduction of cloud-computing, efficient secure data deduplication has attracted much concentration in recent occasions from research community. Data deduplication could be a committed data compression technique that's generally introduced for eliminating duplicate copies of repeating storage data. Inside our work we solve impracticality of deduplication by differential legal rights within cloud-computing, we create a hybrid cloud structural design made up of everybody cloud and cloud.


Keywords


Cloud Computing; Public Cloud; De-Duplication; Data Storage;

References


M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.

S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.

A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud Computing, 2011.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.