A CROSS CLOUD METHOD FOR PROTECTED APPROVED DEDUPLICATION

Murali . J, V Krishna Chaitanya

Abstract


Previous systems cannot support differential authorization duplicate check, in a number of applications. Within the recent occasions, structural design was offered that comprised of dual clouds for effective outsourcing of understanding additionally to arbitrary computations towards an untrustworthy commodity cloud. With the development of cloud computing, efficient secure data deduplication has attracted much concentration in recent occasions from research community. Data deduplication may well be a committed data compression technique that's generally introduced for eliminating duplicate copies of repeating storage data. Dissimilar to established systems, private cloud is provided just like a proxy towards permitting data owner to safely execute duplicate check by differential legal rights and therefore this architecture is helpful while offering attracted much consideration from researchers.   Within our work we solve impracticality of deduplication by differential legal rights within cloud computing, we produce a hybrid cloud structural design comprised of everyone cloud and cloud.


Keywords


Cloud Computing; Public Cloud; Outsourcing; Twin Clouds; Data Storage;

References


S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.

A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud Computing, 2011.

M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.