TOWARDS A NOVEL HYBRID APPROACH FOR REMOVING DUPLICATE COPIES OF REPEATED DATA

D. Sravani, P. Giridhar

Abstract


Previous systems cannot support differential authorization duplicate check, in several applications. In the recent times, structural design was offered that consisting of twin clouds for effective outsourcing of data as well as arbitrary computations towards an untrustworthy commodity cloud. With the introduction of cloud computing, efficient secure data deduplication has attracted much concentration in recent times from research community. Data deduplication is a committed data compression technique that is generally introduced for eliminating duplicate copies of repeating storage data. Distinct from established systems, private cloud is offered as a proxy towards permitting data owner to securely execute duplicate check by differential privileges and hence this architecture is useful and has attracted much consideration from researchers.   In our work we solve difficulty of deduplication by differential privileges within cloud computing, we imagine a hybrid cloud structural design consisting of a public cloud and private cloud. 


Keywords


Cloud computing; Public cloud; Outsourcing; twin clouds; Data storage;

References


. M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.

. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

. R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.

. S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.

. A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud Computing, 2011.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.