CFP last date
20 January 2025
Reseach Article

A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing

by Sharma Bharat, Mandre B.r.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 16
Year of Publication: 2015
Authors: Sharma Bharat, Mandre B.r.
10.5120/21311-4286

Sharma Bharat, Mandre B.r. . A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing. International Journal of Computer Applications. 120, 16 ( June 2015), 19-24. DOI=10.5120/21311-4286

@article{ 10.5120/21311-4286,
author = { Sharma Bharat, Mandre B.r. },
title = { A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 16 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number16/21311-4286/ },
doi = { 10.5120/21311-4286 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:07:13.180230+05:30
%A Sharma Bharat
%A Mandre B.r.
%T A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 16
%P 19-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The popularity and widespread use of Cloud have brought great convenience for data sharing and data storage. The data sharing with a large number of participants take into account issuers like data integrity, efficiency and privacy of the owner for data. In cloud storage services one critical challenge is to manage ever-increasing volume of data storage in cloud. To make data management more scalable in cloud computing field, deduplication a well-known technique of data compression to eliminating duplicate copies of repeating data in storage over a cloud. Even if data deduplication brings a lot of benefits in security and privacy concerns arise as user's sensitive data are susceptible to both attacks insider and outsider. A convergent encryption method enforces data confidentiality while making deduplication feasible. Traditional deduplication systems based on convergent encryption even though provide confidentiality but do not support the duplicate check on basis of differential privileges. This paper presents, the idea of authorized data deduplication proposed to protect data security by including differential privileges of users in the duplicate check. Deduplication systems, users with differential privileges are further considered in duplicate check besides the data itself. To support stronger security the files are encrypted with differential privilege keys. Users are only allowed to perform the duplicate check for files marked with the corresponding privileges to access. The user can verify his/her presence of file after deduplication in cloud with the help of a third party auditor by auditing the data. Further auditor audits and verifies the uploaded file on time. Therefore, this paper creates benefits to both the storage provider and user by deduplication technique and auditing technique respectively.

References
  1. Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou Jin Li, "A Hybrid Cloud Approach for Secure Authorized," IEEE Transactions on Parallel and Distributed Systems, vol. pp, pp. 1-12, 2014.
  2. S. Quinlan and S. Dorward. , "Venti: a new approach to archival storage. ," Proc. USENIX FAST, Jan 2002.
  3. A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. J. R. Douceur, "Reclaiming space from duplicate files in a serverless distributed," ICDCS, pp. 617-624, 2002.
  4. D. Harnik, B. Pinkas, and A. Shulman-Peleg. S. Halevi, "Proofs of ownership in remote storage systems. ," ACM Conference on Computer and Communications Security, pp. 491-500, 2011.
  5. Sriram Keelveedhi, Thomas Ristenpart Mihir Bellare, "Message-locked encryption and secure deduplication," in Springer Berlin Heidelberg,International Association for Cryptologic Research, Advances in Cryptology – EUROCRYPT 2013, Athens, Greece, March 2013, pp. 296-312.
  6. S. Nurnberger, A. Sadeghi, and T. Schneider. S. Bugiel, "Twin clouds: An architecture for secure cloud computing. ," Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
  7. Edward J. Coynek, Hal L. Feinsteink and Charles E. Youmank Ravi S. Sandhu, "Role-Based Access Control Models," IEEE Computer, vol. 29, pp. 38-47, Feb 1996.
  8. Sherman S. -M. Chow, Qian Wang, Kui Ren, and Wenjing Lou Cong Wang, "Privacy-Preserving Public Auditing for Secure Cloud Storage," Computers, IEEE Transactions, vol. 62, no. 2, pp. 362 - 375, Feb 2013.
  9. CLOUDS. [Online]. http://www. cloudbus. org/cloudsim/
  10. Crypto Packages Java. [Online]. http://docs. oracle. com/javase/7/docs/api/javax/crypto/package-summary. html
Index Terms

Computer Science
Information Sciences

Keywords

Authorized check duplicates confidentially auditing.