Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Secured Authorized Block Level Deduplication on Hybrid Cloud  
  Authors : Prerana T. Nitnaware; Vikas B. Maral
  Cite as:

 

Data deduplication is a specialized data compression technique for eliminating duplicate copies of identical data, and it is mostly used in cloud storage to save bandwidth and reduce the amount of storage space. In many organizations, the storage systems contain duplicate copies of many pieces of data i.e. different users save the same file having same data in several different places. Deduplication eliminates these extra copies by saving just one copy of the data and replacing the other copies with pointers that lead back to the original copy. It uses the convergent encryption technique to encrypt the data before outsourcing. For confidentiality we using the concept of Hybrid cloud. The protocol uses authorized duplicate check for hybrid cloud architecture. Different from traditional systems, the differential privileges of users are considered in duplicate check besides the data itself. Our proposed duplicate check scheme incurs minimal overhead compared to normal operations.

 

Published In : IJCSN Journal Volume 5, Issue 2

Date of Publication : April 2016

Pages : --

Figures :02

Tables : --

Publication Link : Secured Authorized Block Level Deduplication on Hybrid Cloud

 

 

 

Prerana T. Nitnaware : is pursuing ME in Computer Science and Engineering at the KJ College of Engineering & Management Research, Pune, affiliated with SPPU University, Pune, Maharashtra. She had worked with Centre for Development of Advanced Computing (C-DAC), the premier R&D organization of the Department of Electronics and Information Technology, Pune, India from 2008-2012. She received the BE degree in Computer Science and Engineering from Amravati University, Amravati, Maharashtra in 2007.

Vikas B. Maral : received the BE & MTech degree in Computer Science and Engineering from SPPU University, Pune, Maharashtra in 2004 & 2011 respectively. He is now an Assistant Professor at the KJ College of Engineering & Management Research Pune affilited with SPPU University, Pune, Maharashtra. His current research interests include parallel and distributed computing, operating systems, cloud computing and systems security. He published more than 15 papers in national and International journals and conferences, such as International Conference on Computing, Communication Control and Automation, IEEE 2015, ICAC3, International Conference on Contemporary Computing and Informatics, IEEE 2014, International Conference on Computational Intelligence and Computing Research, IEEE 2013, IJARCSMS, IJCSIT, IJECS, IJSR.

 

 

 

 

 

 

 

Block level Deduplication, authorized duplicate check, confidentiality, hybrid cloud

In this paper secure deduplication occurs with the help of token generation and secure upload/download of file. It assures the user about high data security and also avoids data duplication in cloud storage. The concept of authorized data deduplication to protect the data security by providing differential privileges of users in the duplicate check. To support authorized duplicate check in hybrid cloud architecture new de-duplication constructions is provided, in which private cloud server is used for the duplicate check, in which the duplicate-check tokens of files are generated by the private cloud server with private keys. Security analysis demonstrates that our schemes are secure in terms of insider and outsider attacks specified in the proposed security model. The proposed system aims to have minimal overhead in entire upload and download process and is negligible for moderate file size.

 

 

 

 

 

 

 

 

 

[1] Jin Li and Yan Kit Li ?A Hybrid cloud approach for secure authorized deduplication, IEEE Transaction on parallel and distributed system, 2014. [2] Anderson, Paul, and Le Zhang. "Fast and Secure Laptop Backups with Encrypted De-duplication." LISA. 2010. [3] Bellare, Mihir, Sriram Keelveedhi, and Thomas Ristenpart. "DupLESS: server-aided encryption for deduplicated storage." Proceedings of the 22nd USENIX conference on Security. USENIX Association, 2013. [4] Bellare, Mihir, Sriram Keelveedhi, and Thomas Ristenpart. "Message-locked encryption and secure deduplication." Advances in Cryptology–EUROCRYPT 2013. Springer Berlin Heidelberg, 2013. 296-312. [5] Bellare, Mihir, Chanathip Namprempre, and Gregory Neven. "Security proofs for identity-based identification and signature schemes." Journal of Cryptology 22.1 (2009): 1-61. [6] Li, Jin, et al. "A Hybrid Cloud Approach for Secure Authorized Deduplication." [7] Bugiel, Sven, et al. "Twin clouds: An architecture for secure cloud computing." Proceedings of the Workshop on Cryptography and Security in Clouds Zurich. 2011. [8] Halevi, Shai, et al. "Proofs of ownership in remote storage systems." Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011. [9] Di Pietro, Roberto, and Alessandro Sorniotti. "Boosting efficiency and security in proof of ownership for deduplication." Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM, 2012. [10] J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side Deduplication of encrypted data in cloud storage. In ASIACCS, Pages 195–206, 2013. [11] Ng, Wee Keong, Yonggang Wen, and Huafei Zhu. "Private data deduplication protocols in cloud storage." Proceedings of the 27th Annual ACM Symposium on Applied Computing. ACM, 2012. [12] Zhang, Kehuan, et al. "Sedic: privacy-aware data intensive computing on hybrid clouds." Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011. [13] Wang, Cong, et al. "Privacy-preserving public auditing for data storage security in cloud computing." INFOCOM, 2010 Proceedings IEEE, 2010.