Research Paper | Information Technology | India | Volume 4 Issue 5, May 2015
A Secure Approach for Deduplication using Hybrid Cloud
Yusuf Aliyu Adamu
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the condentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this study makes the rst attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself, also several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the denition specied in the proposed security model and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Keywords: convergent encryption, deduplication, key generation, storage service provider, proof of ownership
Edition: Volume 4 Issue 5, May 2015
Pages: 1777 - 1781
How to Cite this Article?
Yusuf Aliyu Adamu, "A Secure Approach for Deduplication using Hybrid Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154582, Volume 4 Issue 5, May 2015, 1777 - 1781
129 PDF Views | 100 PDF Downloads
Similar Articles with Keyword 'convergent encryption'
Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015
Pages: 2400 - 2403Secure Deduplication in Cloud Backup Services
Nidhi Panpaliya, Prachi Sorte
Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015
Pages: 1777 - 1781A Secure Approach for Deduplication using Hybrid Cloud
Yusuf Aliyu Adamu
Similar Articles with Keyword 'deduplication'
Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015
Pages: 2400 - 2403Secure Deduplication in Cloud Backup Services
Nidhi Panpaliya, Prachi Sorte
Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015
Pages: 1777 - 1781A Secure Approach for Deduplication using Hybrid Cloud
Yusuf Aliyu Adamu
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 2109 - 2113Secured Deduplication using Hybrid Cloud Approach
Gaurav Kakariya, Sonali Rangdale
Similar Articles with Keyword 'key generation'
Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014
Pages: 1360 - 1367Implementation of Location based Encryption in GSM Cellular Network using OPNET
Vijay S. More, Uma R. Godase
Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016
Pages: 1103 - 1107Up in the Air: Cloud Computing Security and RSA Algorithm
Pooja Bharadwaj, Shivani Mankotia
Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015
Pages: 2400 - 2403Secure Deduplication in Cloud Backup Services
Nidhi Panpaliya, Prachi Sorte
Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015
Pages: 1777 - 1781A Secure Approach for Deduplication using Hybrid Cloud
Yusuf Aliyu Adamu
Survey Paper, Information Technology, India, Volume 3 Issue 5, May 2014
Pages: 266 - 268Advancement in Security and Efficiency for Attribute Based Data Sharing System
Vaibhav Satane, Arindam Dasgupta