Abstract of A Secure Approach for Deduplication using Hybrid C
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 114

Research Paper | Information Technology | India | Volume 4 Issue 5, May 2015

A Secure Approach for Deduplication using Hybrid Cloud

Yusuf Aliyu Adamu

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the condentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this study makes the rst attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself, also several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the denition specied in the proposed security model and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

Keywords: convergent encryption, deduplication, key generation, storage service provider, proof of ownership

Edition: Volume 4 Issue 5, May 2015

Pages: 1777 - 1781

Share this Article

How to Cite this Article?

Yusuf Aliyu Adamu, "A Secure Approach for Deduplication using Hybrid Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154582, Volume 4 Issue 5, May 2015, 1777 - 1781

Enter Your Email Address


Similar Articles with Keyword 'deduplication'

Downloads: 108

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Downloads: 114

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

Share this Article

Similar Articles with Keyword 'key generation'

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016

Pages: 1103 - 1107

Up in the Air: Cloud Computing Security and RSA Algorithm

Pooja Bharadwaj, Shivani Mankotia

Share this Article

Similar Articles with Keyword 'convergent'

Downloads: 108

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1995 - 1998

Outsourcing Data on Cloud Using Aggregate Key

Ramakrishna Jadhav

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article
Top