CFP last date
20 December 2024
Reseach Article

A Survey of Secure Data Deduplication

by Riddhi Movaliya, Harshal Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 11
Year of Publication: 2016
Authors: Riddhi Movaliya, Harshal Shah
10.5120/ijca2016908986

Riddhi Movaliya, Harshal Shah . A Survey of Secure Data Deduplication. International Journal of Computer Applications. 138, 11 ( March 2016), 6-8. DOI=10.5120/ijca2016908986

@article{ 10.5120/ijca2016908986,
author = { Riddhi Movaliya, Harshal Shah },
title = { A Survey of Secure Data Deduplication },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 11 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number11/24421-2016908986/ },
doi = { 10.5120/ijca2016908986 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:23.494783+05:30
%A Riddhi Movaliya
%A Harshal Shah
%T A Survey of Secure Data Deduplication
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 11
%P 6-8
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now days due to advancement of storage technology and computer technology, larger fraction of data is being maintained in digitized form. The same data is stored over and over again, consuming unnecessary storage space on the disc. Deduplication is ideal for highly redundant operations like backup, which requires repeatedly coping and storing the same data. Data deduplication is one of the most alive topics in storage because it enables companies to save a lot of money on storage costs. For cloud provider it is very helpful because you can deduplicate what you store. Due to reduction in cost it is being more popular. This paper will briefly describe Data Deduplication and give a comprehensive survey.

References
  1. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179–194.
  2. Nesrine Kaaniche, Maryline Laurent “A Secure Client Side Deduplication Scheme in Cloud Storage Environments” IEEE Transactions on Mobility and Security (NTMS) in Cloud Computing, Issue Date:April.2.2014
  3. Chun-I Fan, Shi-Yuan Huang, and Wen-Che Hsuz” Hybrid Data Deduplication in Cloud Environment” 978-1-4673-2588-2/12/$31.00 ©2012 IEEE
  4. Waraporn Leesakul, Paul Townend, Jie Xu” Dynamic Data Deduplication in Cloud Storage” 2014 IEEE 8th International Symposium on Service Oriented System Engineering
  5. Zhaocong Wen, Jinman Luo, Huajun Chen, Jiaxiao Meng, Xuan Liand Jin Li “A Verifiable Data Deduplication Scheme in Cloud Computing” 2014 International conference on Intelligent networking and collaborative System. 978-1-4799-6387-4/14 $31.00 © 2014 IEEE
  6. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing,” in Proc. Workshop Cryptography Security Clouds, 2011, pp. 32–44.
  7. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P.C. Lee, and Wenjing Lou “A Hybrid Cloud Approach for Secure Authorized Deduplication” IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 5, May 2015
  8. P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. 24th Int. Conf. Large Installation Syst. Admin., 2010, pp. 29–40.
  9. D. Ferraiolo and R. Kuhn, “Role - based access controls,” in Proc. 15th NIST - NCSC Nat. Comput. Security Conf., 1992, pp. 554–563.
  10. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296–312.
  11. J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” IACR Cryptology ePrint Archive, 2013:149, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Data Deduplication Cloud Computing Cloud Storage Data Security