We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Data Deduplication in Cloud Storage

Published on December 2015 by Pawar P.r, Aarti Waghmare
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 3
December 2015
Authors: Pawar P.r, Aarti Waghmare
502f4885-3f37-4a8f-a48d-83ba249a1c3c

Pawar P.r, Aarti Waghmare . Data Deduplication in Cloud Storage. National Conference on Advances in Computing. NCAC2015, 3 (December 2015), 5-9.

@article{
author = { Pawar P.r, Aarti Waghmare },
title = { Data Deduplication in Cloud Storage },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 3 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 5-9 },
numpages = 5,
url = { /proceedings/ncac2015/number3/23370-5032/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Pawar P.r
%A Aarti Waghmare
%T Data Deduplication in Cloud Storage
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 3
%P 5-9
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud storage has become so popular in a now days not because of its cost efficient on demand usage but because of provision of huge amount of storage on which user can easily outsource its data. Most of the surveys told that nearly half of consumed storage on cloud is occupied by duplicate files or data. Challenge in front of today's cloud services is the management of that huge increasing quantity of data. To make data management scalable, de-duplication is introduced. In deduplication, instead of storing multiple copies of data which are exactly identical, it keeps only one physical copy. Security and privacy are among top concerns for the public cloud environments. This Data confidentiality for users is achieved with Convergent Encryption instead of Traditional encryption.

References
  1. A Hybrid Cloud Approach for Secure Authorized Deduplication Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou No. 6, June 2014
  2. P. Anderson and L. Zhang, ''Fast and Secure Laptop Backups with Encrypted De-Duplication,'' in Proc. USENIX LISA, 2010, pp. 1-8.
  3. Secure Deduplication with Encrypted Data for Cloud Storage Pasquale Puzio (SecludIT, France & EURECOM, France), Refik Molva (Institut Eurecom, France), Melek Önen (EURECOM, France) and Sergio Loureiro (SecludIT, France), March, 2013.
  4. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, ''Reclaiming Space from Duplicate Files in a Serverless Distributed File.
  5. Reclaiming Space from Duplicate Files in a Serverless Distributed File System, John R. Douceur, Atul Adya, William J. Bolosky, Dan Simon, Marvin Theimer Microsoft Research {johndo, adya, bolosky, dansimon, theimer}@microsoft. com
  6. David Geer, "Reducing the Storage Burden via Data Deduplication. computer. org, December 2008.
  7. http://www. computerworld. com/article/2474479/data-center/data- eduplication-in-the-cloud-explained--part-one. html
  8. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, "A Hybrid Cloud Approach for Secure Authorized Deduplication", IEEE Transactions on Parallel and Distributed Systems,Volume:PP,Issue:99,Date of Publication :18. April. 2014.
  9. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.
  10. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.
  11. M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.
  12. M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.
  13. Shai Halevi1, Danny Harnik2, Benny Pinkas3, and Alexandra Shulman-Pel : Proofs of Ownership in Remote Storage Systems , eg2 1IBM T. J. Watson Research Center, 2IBM Haifa Research Lab, 3Bar Ilan University
  14. On Secure De-Duplication Using Convergent Encryption Key Management. Ms. Madhuri A. Kavade1, Prof. A. C. Lomte2
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Data Deduplication Convergent Encryption Proof Of Ownership Data Confidentiality.