S. Narendar, U. Sivaji


We have addressed authoritative problem of de-duplication above data in public cloud in our work. Established de-duplication methods cannot preserve different authorization duplicate check, which is important in numerous applications. These methods on basis of convergent encryption, even though providing privacy to a certain amount, do not support duplicate check with different privileges. No differential privileges were considered in de-duplication on basis of convergent encryption. In recent times construction was provided which consist of twin clouds for confined outsourcing of data and subjective computations towards an un-trusted commodity cloud. Methods of hybrid cloud were provided to sustain privacy-aware data-intensive computing. We introduce hybrid cloud design comprising of public cloud as well as a private cloud for solving of de-duplication difficulty with different privileges in cloud computing. Dissimilar from conventional data de-duplication systems, private cloud is concerned as a proxy for allowing data owner to securely execute duplicate check with different privileges. This is an effective design in support of data de-duplication including twin clouds such as public cloud and private cloud within cloud computing and such architecture is realistic and has been paying much attention.


De-duplication; Encryption; Hybrid cloud; Cloud computing; public cloud;


W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441–446. ACM, 2012.

R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.

S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.

J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In Technical Report, 2013.

M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data deduplication. In Proc. of StorageSS, 2008.

Z. Wilcox-O’Hearn and B. Warner. Tahoe: the least-authority filesystem. In Proc. of ACM StorageSS, 2008.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.