Improving Security on Cloud Based Deduplication System
DOI:
https://doi.org/10.51983/ajcst-2018.7.S1.1813Keywords:
Convergent Key Cryptography, Proof of Ownership, Deduplication, Cloud SecurityAbstract
Cloud computing provides a scalable platform for large amount of data and processes that work on various applications and services by means of on-demand service. The storage services offered by clouds have become a new profit growth by providing a comparable cheaper, scalable, location-independent platform for managing users’ data. The client uses the cloud storage and enjoys the high end applications and services from a shared group of configurable computing resources using cloud services. It reduces the difficulty of local data storage and maintenance. But it gives severe security issues toward users’ outsourced data. Data Redundancy promotes the data reliability in Cloud Storage. At the same time, it increases storage space, Bandwidth and Security threats due to some server vulnerability. Data Deduplication helps to improve storage utilization. Backup is also less which means less Hardware and Backup media. But it has lots of security issues. Data reliability is a very risky issue in a Deduplication storage system because there is single copy for each file stored in the server which is shared by all the data owners. If such a shared file/chunk was missing, large amount of data becomes unreachable. The main aim of this work is to implement Deduplication System without sacrificing Security in cloud storage. It combines both Deduplication and convergent key cryptography with reduced overhead.
References
J. Li, X. Chen, X. Huang, S. Tang, Y. Xiang, M. M. Hassan, and A. H. Alelaiwi, "Secure Distributed Deduplication Systems with Improved Reliability," IEEE Transactions on Computers, vol. 64, pp. 3569-3579, December 2015.
T.-Y. Wu, J.-S. Pan, and C.-F. Lin, "Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes," IEEE Systems Journal, vol. 8, pp. 2018-218, March 2014.
J. Li, X. Chen, F. Xhafa, and L. Barolli, "Secure Deduplication Storage Systems Supporting Keyword Search," Journal of Computer and System Sciences, vol. 81, pp. 1532-1541.
J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee, and W. Lou, "Secure Deduplication with Efficient and Reliable Convergent Key Management," IEEE Transactions On Parallel And Distributed Systems, vol. 25, pp. 1615-1625, June 2014.
D. S. Bhaskar and B. Shylaja, "Performance Comparison of Deduplication Techniques For Storage In Cloud Computing Environment," Asian Journal of Computer Science And Information Technology, vol. 4, pp. 42-46, 2014.
A. N. Naveen and V. Ravi, "Client Side Deduplication Scheme for Secured Data Storage in Cloud Environments," International Journal of Engineering Research & Technology, vol. 4, May 2015.
R. Chen, Y. Mu, and F. Guo, "BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication," IEEE Transactions on Information Forensics and Security, vol. 10, pp. 2643-2652, August 2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.