CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Design and Implementation of a Hybrid Cloud Approach for Secure Authorized Deduplication

by Satish Khadke, Sayyed Mustafa, Syed Akhtar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 6
Year of Publication: 2017
Authors: Satish Khadke, Sayyed Mustafa, Syed Akhtar
10.5120/ijca2017913543

Satish Khadke, Sayyed Mustafa, Syed Akhtar . Design and Implementation of a Hybrid Cloud Approach for Secure Authorized Deduplication. International Journal of Computer Applications. 163, 6 ( Apr 2017), 5-8. DOI=10.5120/ijca2017913543

@article{ 10.5120/ijca2017913543,
author = { Satish Khadke, Sayyed Mustafa, Syed Akhtar },
title = { Design and Implementation of a Hybrid Cloud Approach for Secure Authorized Deduplication },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 6 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number6/27397-2017913543/ },
doi = { 10.5120/ijca2017913543 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:25.444497+05:30
%A Satish Khadke
%A Sayyed Mustafa
%A Syed Akhtar
%T Design and Implementation of a Hybrid Cloud Approach for Secure Authorized Deduplication
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 6
%P 5-8
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data deduplication began to emerge approximately ten years ago, but has only recently become a important technology and also it is one of important data compression techniques to eliminate duplicate copies of data. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. Here new deduplication constructions supporting authorized duplicate check in this hybrid cloud architecture are presented. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

References
  1. Jawahar Thakur and Nagesh Kumar, ‘DES, AES Blowfish: Symmetric Key Cryptography Algorithm Simulation Based Performance Analysis’, International Journal of Emerging Technologies and Advanced Engineering(IJETAE), December(2011), ISSN: 2250-2459 Vol. 1, Issue 2.
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Neha Jain and Gurpreet Kaur, ‘Implementing DES Algorithm in Cloud for Data Security’, VSRD International Journal of CS & IT. (2012), Vol.2 Issue 4, pp. 316-321.
  3. Rachna Jain and Ankur Aggarwal ‘Cloud Computing Security Algorithm’, International Journal of Advanced Research in Computer Science and Software Engineering. January (2014) Vol. 4, Issue 1.
  4. Pratap Chandra Mandal, ‘Superiority of Blowfish Algorithm’, International Journal of Advanced Research in Computer Science and Software Engineering. September (2012) ISSN: 2277-128X Vol. 2, Issue 7.
  5. Sandipan Basu, ‘International Data Encryption Algorithm (IDEA) - A Typical Illustration’, Journal of Global Research in Computer Science. July (2011) ISSN: 2229-371X Vol. 2, Issue 7.
  6. B.Persis Urbana Ivy, Purshotam Mandiwa and Mukesh Kumar, ‘A Modified RSA Cryptosystem Based on ‘n’ Prime Number’, International Journal of Engineering and Computer Science. Nov (2012) ISSN: 2319-7242 Volume 1 Issue 2.
  7. Ayan Mahalanobis, ‘Diffie-Hellman Key Exchange Protocol’, Its Gernalization and Nilpotent Groups. August (2005).
  8. Alexa Huth and James Cebula ‘The Basics of Cloud Computing’, United States Computer Emergency Readiness Team. (2011).
  9. Shakeeba S. Khan and Prof. R.R. Tuteja, ‘Security in Cloud Computing Using Cryptographic Algorithms’, International Journal of Innovative Research in Computer and Communication Engineering. January 1, (2015) ISSN (online): 2320-9801, (Print): 2320-9798 Vol. 3.
  10. Maha TEBAA, Said EL HAJJI and Abdellatif EL GHAJI, ‘Homomorphic Encryption Applied to the Cloud Computing Security’, World Congress on Engineering. July 4 (2012) Vol. 1, London U.K. ISBN: 978-988-19251-3-8, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (online).
  11. G. Devi and M. Pramod Kumar, ‘Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish Algorithm’, International Journal of Computer Trends and Technology. (2012) Vol. 3 Issue 4, ISSN: 2231-2803, pp.592-596.
  12. Manzoor Hussain Dar, Pardeep Mittal and Vinod Kumar, ‘A Comparative Study of Cryptographic Algorithms’, International Journal of Computer Science and Network. June (2014) ISSN(Online): 2277-5420, Volume 3, Issue 3.
Index Terms

Computer Science
Information Sciences

Keywords

Authorized duplicate check deduplication hybrid cloud private cloud public cloud security algorithms