International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

A Trusted Framework for Data Security in Cloud Environment

Mannem Sindhuja, Punugoti Pavan Kumar

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data and has been widely used in cloud storage in order to minimize the amount of storage space and save bandwidth. For protection of data security, this paper makes an attempt to primarily address the problem of authorized data deduplication. To protect the confidentiality of important data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. Along with the data the privilege level of the user is also checked in order to assure whether he is an authorized user or not. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. We show that our proposed authorized duplicate check scheme has minimal overhead compared to normal operations. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct tested experiments using our prototype. This paper tries to minimize the data duplication that occurs in hybrid cloud storage by using various techniques.

Keywords: Deduplication, authorized duplicate check, confidentiality, hybrid cloud

Edition: Volume 4 Issue 11, November 2015

Pages: 1728 - 1730


How to Cite this Article?

Mannem Sindhuja, Punugoti Pavan Kumar, "A Trusted Framework for Data Security in Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB159028, Volume 4 Issue 11, November 2015, 1728 - 1730

19 PDF Views | 23 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Deduplication'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2223 - 2225

Survey on Fragmentation for Deduplication in Backup Storage

Reshma A. Fegade, R. D. Bharti

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 2217 - 2219

A Hybrid Cloud Approach for Secure Authorized Deduplication

Sunita S. Velapure, S. S. Barde

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1613 - 1618

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma

Share this article



Similar Articles with Keyword 'authorized duplicate check'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1741 - 1745

Realization of Hybrid Cloud Approach for Sheltered formal Deduplication

S. Srinivasareddy, M. Geethalatha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1728 - 1730

A Trusted Framework for Data Security in Cloud Environment

Mannem Sindhuja, Punugoti Pavan Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1395 - 1398

Security Analysis and Deduplication Using Convergent Algorithm

Rajkumar N Pagadi, Dr. Shubhangi D C

Share this article



Similar Articles with Keyword 'confidentiality'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1731 - 1735

Concurrent and Free Accessing in Encrypted Cloud Databases

G. Sudheer Kumar, P. Pavan Kumar

Share this article



Similar Articles with Keyword 'hybrid cloud'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 2217 - 2219

A Hybrid Cloud Approach for Secure Authorized Deduplication

Sunita S. Velapure, S. S. Barde

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 756 - 759

Cloud Computing: A New Era of IT Opportunity and Challenges

K Sampath Kumar, M Ronith, B Sanjay Krishna, Mohammed Jasam

Share this article
Top