International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 126 - Number 10 |
Year of Publication: 2015 |
Authors: Madhuri Kavade, A.C. Lomte |
10.5120/ijca2015906198 |
Madhuri Kavade, A.C. Lomte . Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage. International Journal of Computer Applications. 126, 10 ( September 2015), 5-9. DOI=10.5120/ijca2015906198
One very important challenges of today’s cloud storage services is that the management of the ever-increasing amount of data. To create data management scalable, de-duplication has been a widely known technique to condense space for storing and transfer information measure in cloud storage. Rather than keeping multiple data copies with an equivalent content, de-duplication eliminates redundant data by keeping just one physical copy and referring different redundant data to it copy. Convergent Encryption, additionally called content hash keying, could be a cryptosystem that produces identical ciphertext from identical plaintext files. Data de-duplication could be a technique for eliminating duplicate copies of data, and has been wide employed in cloud storage to scale back space for storing and transfer information measure. Promising because it is, associate degree arising challenge is to perform secure de-duplication in cloud storage. Currently daily the foremost arising challenge is to perform secure de-duplication in cloud storage. Though Convergent Encryption has been extensively adopted for secure de-duplication, a essential issue of creating Convergent Encryption sensible is to with efficiency and dependably manage a large range of convergent keys. we have a tendency to initial introduce a baseline approach during which file level de-duplication is performed and it doesn't support on-line approach. For that purpose the current context have a tendency to formally address the matter of achieving economical and reliable key management in secure de-duplication. Within the planned design Dupkey, users don’t ought to manage any keys on their own. It implements de-duplication at block level and provides a lot of security. Dupkey is on-line approach and supply de-duplication and reduces DB size on cloud.