CFP last date
20 January 2025
Reseach Article

Secure Deduplication Techniques: A Study

by Vruti Satish Radia, Dheeraj Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 8
Year of Publication: 2016
Authors: Vruti Satish Radia, Dheeraj Kumar Singh
10.5120/ijca2016908874

Vruti Satish Radia, Dheeraj Kumar Singh . Secure Deduplication Techniques: A Study. International Journal of Computer Applications. 137, 8 ( March 2016), 41-43. DOI=10.5120/ijca2016908874

@article{ 10.5120/ijca2016908874,
author = { Vruti Satish Radia, Dheeraj Kumar Singh },
title = { Secure Deduplication Techniques: A Study },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 8 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 41-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number8/24299-2016908874/ },
doi = { 10.5120/ijca2016908874 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:52.391230+05:30
%A Vruti Satish Radia
%A Dheeraj Kumar Singh
%T Secure Deduplication Techniques: A Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 8
%P 41-43
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Currently usage of cloud storage is increasing and to overcome increasing data issue, Data deduplication techniques are used. Moreover the Cloud storage service is provided by third party cloud providers thus security of data is needed. Data Deduplication techniques cannot be applied directly with security mechanisms. Thus here in this paper we would be discussing data deduplication techniques along with securing techniques thus forming secure deduplication.

References
  1. Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Hassan and AbdulhameedAlelaiwi, “Secure Distributed Deduplication Systems with Improved Reliability”, IEEE Transactions on Computers Volume: PP, Year – 2015
  2. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management”, IEEE Transactions on Parallel and Distributed Systems vol. 25(6), Year – 2014
  3. Yukun Zhou, Dan Feng, Wen Xia, Min Fu, Fangting Huang, Yucheng Zhang, Chunguang Li, “SecDep: A User-Aware Efficient Fine-Grained Secure Deduplication Scheme with Multi-Level Key Management”, IEEE Mass Storage Systems and Technologies (MSST) 2015 31st Symposium, Year - 2013
  4. M. Bellare, S. Keelveedhi, and T. Ristenpart, ‘‘Message-Locked Encryption and Secure Deduplication”, Springer 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques at Athens Greece Proceedings, Year – 2013
  5. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Server-aided encryption for deduplicated storage”, ACM SEC'13Proceedings of the 22nd USENIX conference on Security, Year - 2013
  6. “The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things”, http://www.emc.com/leadership/digital-universe/2014iview/executive-summary.htm, April 2014, EMC Digital Universe with Research & Analysis by IDC.
  7. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems”, ACM Conference on Computer and Communications Security, Year – 2011
  8. http://www.druva.com/blog/understanding -data-deduplication/
  9. http://searchdatabackup.techtarget.com/tip/The-pros-and-cons-of-file-level-vs-block-level - data-deduplication-technology
  10. http://www.cddatahouse.co.uk/solutions/dedupe-deduplication-of-data
  11. Neha Kaurav ,“ An Investigation on Data De-duplication Methods And it’s Recent Advancements ”, Proc. of the Intl. Conf. on Advances In Engineering And Technology - ICAET, Year – 2014
  12. Jyoti Malhotra, JagdishBakal, “A Survey and Comparative Study of Data Deduplication Techniques” Pervasive Computing (ICPC) 2015 International Conference IEEE, Year – 2015
  13. NagapramodMandagere, Pin Zhou, Mark A Smith, Sandeep Uttamchandani, “Demystifying data de-duplication”, Proceedings of the ACM/IFIP/USENIX Middleware '08, Year – 2008
  14. IderLkhagvasuren, Jung Min So, Jeong Gun Lee, ChukYoo, Young WoongKo,”Byte-index Chunking algorithm for data deduplication system”, International Journal of Security and its Applications, Year -2013
  15. Cai Bo, Zhang Feng Li, Wang Can, “Research on Chunking Algorithms of Data De-duplication”, Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering Springer, Year – 2012
Index Terms

Computer Science
Information Sciences

Keywords

Data Deduplication Cloud Storage Data Security