CFP last date
20 December 2024
Reseach Article

An Efficient Hybrid Data Deduplication on Clouds using CHAP and Signature based Algorithms

by Shivani Sengar, Ruchika Mishra, Swati Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 13
Year of Publication: 2017
Authors: Shivani Sengar, Ruchika Mishra, Swati Jain
10.5120/ijca2017913663

Shivani Sengar, Ruchika Mishra, Swati Jain . An Efficient Hybrid Data Deduplication on Clouds using CHAP and Signature based Algorithms. International Journal of Computer Applications. 165, 13 ( May 2017), 1-6. DOI=10.5120/ijca2017913663

@article{ 10.5120/ijca2017913663,
author = { Shivani Sengar, Ruchika Mishra, Swati Jain },
title = { An Efficient Hybrid Data Deduplication on Clouds using CHAP and Signature based Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 13 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number13/27726-2017913663/ },
doi = { 10.5120/ijca2017913663 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:21.873597+05:30
%A Shivani Sengar
%A Ruchika Mishra
%A Swati Jain
%T An Efficient Hybrid Data Deduplication on Clouds using CHAP and Signature based Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 13
%P 1-6
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data Deduplication refers to a method that diminishes the unnecessary facts on the storage and transmitting on the network, and is think about to be solitary of the most-enabling storage technologies that presents well-organized resource exploitation in the haze computing. Here in this daily a new approach for Data Deduplication is proposed which is founded on the notion of applying Challenge Handshake Authentication Protocol and then applying Elliptic Curve based Cryptography. The Planned procedure applied here provides better Security in Comparison with the Existing Protocols and also provides better Data Deduplication. The Proposed methodology also provides better Security Prevention from various attacks low Computational Cost and Time.

References
  1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.
  2. D. Russell, “Data deduplication will be even bigger in 2010," Gartner, 2010.
  3. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song. 2011. Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, 1 (2011), 1–34.
  4. Bo Chen, Reza Curtmola, Giuseppe Ateniese, and Randal Burns. 2010. Remote data checking for network coding-based distributed storage systems, 2010.
  5. JadapalliNandini, RamireddyNavateja Reddy, “Implementation of Hybrid Cloud Approach for Secure Authorized Deduplication” International Research Journal of Engineering and Technology (IRJET) Volume: 02 Issue: 03, June-2015.
  6. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, IEEE Transactions on Parallel and Distributed Systems, 2014.
  7. N.B. Kadu, Mr. Amit Tickoo, Mr.Saurabh I. Patil, Mr. Nilesh B. Bhagat , Mr. Ganesh B. Divte, “A Hybrid Cloud Approach for Secure Authorized Deduplication” International Journal of Scientific and Research Publications, Volume 5, Issue 4, April 2015.
  8. GadeSwati,Prof.PrashantKumbharkar, “Cryptosystem For Secure Data Sharing In Cloud Storage”IJIRT Volume 1 Issue 6 2014.
  9. Lukas Malina and Jan Hajny, “Efficient Security Solution for Privacy-Preserving Cloud Services” 6thInternational Conference On Telecommunications Signal Processing Year 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Deduplication Challenge Handshake Authentication Protocol Elliptic Curve Cryptography Authorization.