International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016


Authorized Secure Deduplication in Cloud Computing

R. V. Argiddi | Prachi Sontakke


Abstract: A service model where data is provided to many users over the world, is called as Cloud storage. Data in this model is stored in several logical pools. Cloud storage is a concept of storage beyond an interface where the storage is controlled and managed on demand. This technology gives benefits by many features like data backup and archival, no need of maintaining hardware resources, greater data accessibility, etc. Data deduplication is an important feature in cloud storage. Deduplication process recognizes and gets rid of the repeated data in the backup storage, indirectly improving the network bandwidth. Providing security along with the deduplication process is a challenging task. In this paper, we survey the Ontologies related to deduplication techniques to give future direction. The key aspects used for maintaining security in cloud is convergent encryption. To overcome certain drawbacks in this encryption technique, we will describing new techniques- cryptographic tuning and domain separation. Maintaining the authorized access for the users confidential data, the concept called Proof of Ownership is used for recognizing the respective user along with his access privilege.


Keywords: Secure deduplication, Convergent Encryption, Proof of Ownership, Identification Protocol


Edition: Volume 5 Issue 6, June 2016,


Pages: 706 - 709


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

R. V. Argiddi, Prachi Sontakke, "Authorized Secure Deduplication in Cloud Computing", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 706-709, https://www.ijsr.net/get_abstract.php?paper_id=NOV164306

Similar Articles with Keyword 'Secure deduplication'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1491 - 1494

DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management

Soofiya MS | Sreetha V Kumar

Share this Article

Downloads: 118

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1036 - 1040

Secure Manipulation of Deduplicated Data for Cloud Storage

Renuka Devi S | Eldo P Elias

Share this Article
Top