Secure Deduplication For Cloud Storage Using Memory Mapping Technique For Improving Performance And Security

نویسندگان

چکیده

Data deduplication is a crucial technique for packing data and reducing duplication when transferring data. It widely used in the cloud to restrict usage of capacity memory aids transmission sparing. Before redistributing data, an encryption mechanism ensure integrity sensitive during process. The SHA algorithm being save text format. To generate security bits, padding appended text. In de-duplication, it calculates hash, i.e. hexadecimal number, string, integer Hash-based de-duplication implementation whole file hashing entire file. Text data’s hash values are considered as feature properties. contrast traditional solutions, clients that transfer certify inside virtualization, both limiting primary size blockage important bottlenecks. Memory identifies pages with same content merges them into single file, usage, parceling, improving execution. storage, MPT so copies different owners. If any users try replicate will be mapped related archive implying can’t stored away. security, techniques encrypt throughout procedures prior outsourcing

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security notions for cloud storage and deduplication

Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, but it is not obvious what precise security properties are required for encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency which restricts the application of semant...

متن کامل

Secure Deduplication Scheme for Cloud Storage

Nowadays, the explosive growth of digital contents continues to rise the demand for new storage and network capacities, along with an increasing need for more cost effective use of storage and network bandwidth for data transfer. As such, the use of remote storage systems is gaining an expanding interest, namely the cloud storage based services, since it provides cost efficient architectures. T...

متن کامل

A Secure Data Deduplication Scheme for Cloud Storage

As more corporate and private users outsource their data to cloud storage providers, recent data breach incidents make end-toend encryption an increasingly prominent requirement. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as data deduplication, ineffective. We present a novel idea that differentiates data according t...

متن کامل

Data Deduplication: A Technique for Efficient Storage in Cloud

Cloud Computing allows users to outsource storage and computation to servers using internet. In this paper we propose a data Deduplication technique to reduce the amount of storage space and to save bandwidth. The convergent encryption technique has been proposed to protect the confidentiality of sensitive data. Our scheme has the feature of access which allows only valid users to share the dat...

متن کامل

Improving Cloud Security using Secure Enclaves

Improving Cloud Security using Secure Enclaves by Jethro Gideon Beekman Doctor of Philosophy in Engineering – Electrical Engineering and Computer Sciences University of California, Berkeley Professor David Wagner, Chair Internet services can provide a wealth of functionality, yet their usage raises privacy, security and integrity concerns for users. This is caused by a lack of guarantees about ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Shanghai Ligong Daxue xuebao

سال: 2021

ISSN: ['1007-6735']

DOI: https://doi.org/10.51201/jusst/21/08498