International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 118 | Views: 182

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Rating: 6.8 / 10

Secure Manipulation of Deduplicated Data for Cloud Storage

Renuka Devi S | Eldo P Elias

Abstract: Cloud storage enables to configure and use online storage devices as storage targets. The increasing demand of cloud storage requirement has led to the process of deduplication. The term data deduplication refers to the techniques that store single copy of redundant data, and provide links to that copy instead of storing other actual copies of this data. Deduplication enables to reduce cloud storage space usage and uses network bandwidth efficiently. Convergent encryption technique is used to implement deduplication in the cloud storage, but it introduces new security threats. There comes the need of secure deduplication. Security of the proposed system relies on a proxy server which applies additional encryption on the uploaded data, this protects the data against convergent encryption attacks. System also includes a deduplication manager which deals with block level deduplication. Any cloud storage provider can be easily integrated in the new architecture. The system is implemented with the help of JAVA programming language, SQL database and Amazon s3 cloud service and the results are analyzed.

Keywords: Deduplication, Cloud Storage, Convergent Encryption

Edition: Volume 4 Issue 12, December 2015,

Pages: 1036 - 1040

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait