Secure Distributed and Auditing Reliability for Deduplication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 126 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Secure Distributed and Auditing Reliability for Deduplication

Soumya S. M., Sarvamangala D. R.

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable deduplication system. We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous deduplication systems. Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments.

Keywords: Data deduplication, reliability, distributed deduplication, cloud servers, security requirements, data confidentiality, and tag

Edition: Volume 5 Issue 5, May 2016

Pages: 501 - 505

Share this Article

How to Cite this Article?

Soumya S. M., Sarvamangala D. R., "Secure Distributed and Auditing Reliability for Deduplication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163325, Volume 5 Issue 5, May 2016, 501 - 505

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Data deduplication'

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1613 - 1618

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 2217 - 2219

A Hybrid Cloud Approach for Secure Authorized Deduplication

Sunita S. Velapure, S. S. Barde

Share this Article

Downloads: 110 | Weekly Hits: ⮙4 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this Article

Similar Articles with Keyword 'reliability'

Downloads: 98 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Downloads: 98 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article

Downloads: 101 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2433 - 2435

Using Functional Point Analysis and Test Point Analysis Reducing Maintenance Cost of Software

Samadhan E. Kadam, Amol K. Kadam, Dr. S. D. Joshi

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2264 - 2273

A New View on Method-calls and Contracts to Facilitate Developers in making their Design Decisions

Dr. G. Manoj Someswar, M. Ratna Raju

Share this Article

Downloads: 103 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1959 - 1962

A Survey on Performance and Energy Management in Cloud Computing

Pratima D. Nerkar, Suresh B. Rathod

Share this Article

Similar Articles with Keyword 'cloud servers'

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Downloads: 102 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 103 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1553 - 1555

A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentication

Manju Lakshmi, Anju Rachel Oommen, Smita C Thomas

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'security requirements'

Downloads: 102 | Weekly Hits: ⮙4 | Monthly Hits: ⮙15

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 997 - 1001

Secure and Privacy Preserving Navigation in VANET

Sudarshana A. Abbad, S. P. Godse

Share this Article

Downloads: 114 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1152 - 1154

A Survey on Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (CWSN)

Vijay Kukre, Shubhangi Vairagar

Share this Article

Downloads: 118 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 125 - 127

OI ? Execute Analytics in Real Time

Shivani Grover, Parbhat Verma

Share this Article

Similar Articles with Keyword 'data confidentiality'

Downloads: 100 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 101 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 103 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article

Similar Articles with Keyword 'tag'

Downloads: 152 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 2 | Monthly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 965 - 966

University Event Management System

V. Balu, P. Vagish Krishnan, Varadarajan .M

Share this Article

Downloads: 34 | Weekly Hits: ⮙2 | Monthly Hits: ⮙20

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1179 - 1182

Face Detection Using Haar Cascade Classifiers

Bhavana R. Maale, Dr. Suvarna Nandyal

Share this Article

Downloads: 36 | Monthly Hits: ⮙20

Student Project, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1677 - 1680

Detecting Pneumonia from X-Ray Images using Deep Learning

Deep Piyushkumar Patel

Share this Article



Top