CFP last date
20 January 2025
Reseach Article

An Approach for Secure Distributed Deduplication System

by Anita A. Kundgir, S. S. Hatkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Number 9
Year of Publication: 2017
Authors: Anita A. Kundgir, S. S. Hatkar
10.5120/ijca2017914940

Anita A. Kundgir, S. S. Hatkar . An Approach for Secure Distributed Deduplication System. International Journal of Computer Applications. 170, 9 ( Jul 2017), 42-45. DOI=10.5120/ijca2017914940

@article{ 10.5120/ijca2017914940,
author = { Anita A. Kundgir, S. S. Hatkar },
title = { An Approach for Secure Distributed Deduplication System },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 170 },
number = { 9 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume170/number9/28101-2017914940/ },
doi = { 10.5120/ijca2017914940 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:04.076006+05:30
%A Anita A. Kundgir
%A S. S. Hatkar
%T An Approach for Secure Distributed Deduplication System
%J International Journal of Computer Applications
%@ 0975-8887
%V 170
%N 9
%P 42-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we introduce a deduplication system with improved reliability. As we all know the cloud computing performs a number of operations on data. All commercial cloud service providers know that the users demand for huge amount of storage space because number of online operations. Deduplication is good thing to implement but it will not work on encrypted data because of conflict in encryption. As we know convergent encryption, where key is derived from the hash of data which is recovered by the same encryption key.to overcome from all such interrupts we need a secure system which will perform the deduplication. The system checks at block level as well as file level with assignment of tags. Digital libraries contains huge amounts of data. Most of the times while data storage the number of copies of the same data are stored, again and again, so to remove such duplicate data copies we need a Deduplication technique. The deduplication removes unnecessary data, but at the same time, it is beneficial if it retrieves it with more reliability. In this paper, we have studied various approaches to improve the reliability of data after removing duplicate copies in data storage. The use of such deduplication schemes also reduces the data transfer rate to upload and download data .The time consumption should be less which will effect on its accessibility.

References
  1. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems.” in ACM Conference on Computer and Communications Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500.
  2. Mihir. Bellare, Sriram. Keelveedhi, and T. Ristenpart, “Dupless: Server aided encryption for deduplicated storage,” in USENIX Security Symposium, 2013.
  3. “Secure deduplication with efficient and reliable convergent key management” by J. li,Chen, jingwei,parteic and W.Lou ,in IEEE 2013.
  4. “A Survey on Deduplication Scheme in Cloud Storage” of author Deepa D.,Revathi M.
  5. ” An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”in IEEE transactions in 2012 ,Author K. yang and X.jia.
  6. ”Fingerprinting by random polynomials”,by M. Rabin in 1981.
  7. ”How to share secret” by Adi Shamir in ACM commun.,1979.
  8. “Multiple Ramp schemes”,by A. santis and B.Masuci in IEEE Transactions july 1999.
  9. “Message Locked Encryption in secure deduplication”in Eurocrypt,2013.
  10. “A Secure data deduplication scheme for cloud storage” in technical Report, 2013 by J. Stanek, A. Sorniotti, Androulaki, kenel L.
  11. ”Efficient dispersal of information for security ,load balancing,fault tolerance” in ACM journal 1989,M.Rabin.
  12. “Reclaiming Space from Duplicate Files in a Serverless Distributed File System”. John R.Douceur, Atul Adya, William J. Bolosky, D.Simon, M. Theimer Microsoft .
  13. “A Survey on Data Deduplication in Cloud Storage Environment”, in IJSRET 2015.by Mani U.V., G. Mohan
Index Terms

Computer Science
Information Sciences

Keywords

Cloud storage Deduplication Integrity Secret Sharing Scheme Message locked encryption.