Open Access   Article Go Back

De-duplication with Authorization in Hybrid Cloud Approach for Security

Guljar P. Shaikh1

Section:Research Paper, Product Type: Journal Paper
Volume-04 , Issue-04 , Page no. 1-4, Jun-2016

Online published on Jun 29, 2016

Copyright © Guljar P. Shaikh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Guljar P. Shaikh, “De-duplication with Authorization in Hybrid Cloud Approach for Security,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.1-4, 2016.

MLA Style Citation: Guljar P. Shaikh "De-duplication with Authorization in Hybrid Cloud Approach for Security." International Journal of Computer Sciences and Engineering 04.04 (2016): 1-4.

APA Style Citation: Guljar P. Shaikh, (2016). De-duplication with Authorization in Hybrid Cloud Approach for Security. International Journal of Computer Sciences and Engineering, 04(04), 1-4.

BibTex Style Citation:
@article{Shaikh_2016,
author = {Guljar P. Shaikh},
title = {De-duplication with Authorization in Hybrid Cloud Approach for Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {04},
Issue = {04},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {1-4},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=93},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=93
TI - De-duplication with Authorization in Hybrid Cloud Approach for Security
T2 - International Journal of Computer Sciences and Engineering
AU - Guljar P. Shaikh
PY - 2016
DA - 2016/06/29
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 04
VL - 04
SN - 2347-2693
ER -

           

Abstract

In cloud computing, most of the communication is done in consideration of file processing, and therefore it turn out to be very critical and important to deliver competent method for data security. The main focus in on data deduplication to provide security services over cloud for stored files. Data deduplication is data compression that is used to eliminate the matching copies of echoing data. This procedure is frequently used for reducing the storage space and save bandwidth over cloud. The term deduplication used for data security and privacy offers to the stored data files, Also encryption methods are applied to stored file information for more security purpose. In this paper we have studied the authorized data deduplication technique for providing security by using user’s differential privileges. Novel deduplication structures are offered for supporting authorized duplicate check. This paper shows how the security is achieved in hybrid cloud throughout the data deduplication process.

Key-Words / Index Term

Data Security,Data Deduplication,, Privilege authorization, Hybrid Cloud

References

[1] Guljar P. Shaikh,S. D. Chaudhary, PriyankaPaygude and Debnath Bhattacharyya, “Achieving Secure Deduplication by Using Private Cloud and Public Cloud”, In International Journal of Security and Its Applications Vol. 10, No. 5, 2016, pp.17-26.
[2] Jin Li,yan kit li,xiaofengchen,patrickP.C.lee and wenjinglou,“A Hybrid Cloud Approach for Secure Authorized Deduplication”, In IEEE Transactions on Parallel and Distributed Systems, April 7,2015,pp 1206 – 1216, DOI:10.1109/TPDS.2014.2318320.
[3] MihirBellare, SriramKeelveedhi, and Thomas Ristenpart, “Dupless: Serveraided encryption for deduplicated storage”, In USENIX Security Symposium, Washington DC, August 14-16, 2013, pp 179-194.
[4] MihirBellare, SriramKeelveedhi, and Thomas Ristenpart, “Message-locked encryption and secure deduplication”, in proceedings of EUROCRYPT, Athens Greece, March 3, 2013, pp 296–312.
[5] ShaiHalevi, Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg, “Proofs of ownership in remote storage systems”. In Proceedings of the 18thACM Conference on Computer and Communications Security, Hangzhou, China, 2011,pp 491–500.
[6] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. “Twin clouds: An architecture for secure cloud computing”. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011
[7] Jin Li, XiaofengChen,MingqiangLi,Jingwei Li and Patrick P. C. Lee, “Secure Deduplication with Efficient and Reliable Convergent Key Management”, In IEEE Transactions on Parallel and Distributed Systems, May 12, 2014.pp 1615 – 1625, DOI: 10.1109/TPDS.2013.284.
[8] J. Yuan and S. Yu. “Secure and constant cost public cloud storage auditing with deduplication”. IACR Cryptology ePrint Archive, 2013:149, 2013.
[9] M. Bellare, C. Namprempre, and G. Neven, “Security proofs foridentity-based identification and signature schemes,” J. Cryptol.,vol. 22, no. 1, pp. 1–61, 2009.
[10] P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. 24th International Conference Large Installation System Admin., 2010, pp. 29–40.
[11] W. K. Ng, Y. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” in Proc. 27th Annual ACM Symp. Appl. Computer, 2012, pp. 441–446.
[12] Qinlu He, Zhanhuai Li, Xiao Zhang, “Data Deduplication Techniques”, in International Conference on Future Information Technology and Management Engineering, China, 2010, pp.43-433.
[13] D. Meister and A. Brinkmann, “Multi-Level Comparison of Data Deduplication in a Backup Scenario”, SYSTOR '09 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, ISBN: 978-1-60558-623-6, Article No. 8, ACM New York, NY, USA ©2009.