A Hybrid Cloud Approach for Secure Authorized Deduplication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 110

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this work makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. The work also presents several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, the work implement a prototype of proposed authorized duplicate check scheme and conduct tested experiments using the prototype. The work shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

Keywords: Data deduplication, Convergent encryption, Confidentiality, Hybrid cloud, Authorized Duplicate check

Edition: Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

Share this Article

How to Cite this Article?

Jagadish, Dr.Suvarna Nandyal, "A Hybrid Cloud Approach for Secure Authorized Deduplication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157810, Volume 4 Issue 8, August 2015, 1806 - 1810

Enter Your Email Address




Similar Articles with Keyword 'Data deduplication'

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1613 - 1618

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma

Share this Article

Similar Articles with Keyword 'Convergent encryption'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1395 - 1398

Security Analysis and Deduplication Using Convergent Algorithm

Rajkumar N Pagadi, Dr. Shubhangi D C

Share this Article

Similar Articles with Keyword 'Confidentiality'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Similar Articles with Keyword 'Hybrid cloud'

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Similar Articles with Keyword 'Authorized Duplicate check'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1395 - 1398

Security Analysis and Deduplication Using Convergent Algorithm

Rajkumar N Pagadi, Dr. Shubhangi D C

Share this Article

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1696 - 1698

A Survey on Secure and Authorized Data Deduplication

Shweta Pochhi, Vanita Babanne

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 502 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 83

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'deduplication'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Similar Articles with Keyword 'Convergent'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1395 - 1398

Security Analysis and Deduplication Using Convergent Algorithm

Rajkumar N Pagadi, Dr. Shubhangi D C

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article



Top