Implementation of a File System with Encryption and De-duplication

نویسندگان

  • Xiaoning Jiang
  • Wenhua Zhou
  • Yang Leng
چکیده

With the rapid advance of society, especially the development of computer technology, network technology and information technology, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. In this paper, we propose a prototype file system called EDFS (Encryption and De-duplication File System), which provides both data security and space efficiency in storage systems. We adopt de-duplication technology called CDC (Content-Defined Chunking) to chunk the file and compute its unique fingerprint, lookup different blocks, then store different blocks on server to ensure storage efficiency. Thinking of security, we use convergent encryption to encrypt data blocks, which not only ensure data security but also improve the possibility of de-duplication. Finally, we describe a prototype implementation of EDFS based on FUSE and present an analysis of the potential effectiveness, using real data obtained from a runtime database.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud Based Data Deduplication with Secure Reliability

IJRAET Abstract— To eliminate duplicate copies of data we use data de-duplication process. As well as it is used in cloud storage to minimize memory space and upload bandwidth only one copy for every file stored in cloud that can be used by more number of users. Deduplication process helps to improve storage space. Another challenge of privacy for sensitive data also arises. The aim of this pap...

متن کامل

Enhanced Flush+Reload Attack on AES

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

متن کامل

An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comp...

متن کامل

A Survey on Detection Deduplication Encrypted Files in Cloud

ARTICLE INFO Today is the most important issue in cloud computing is duplication for any organization, so we analysis this issue an avoid the reparative files on cloud storage. Avoidance of the file is advantages the cloud size issue. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before ...

متن کامل

Double Cervix with Normal Uterus and Vagina - An Unclassified Müllerian Anomaly

Müllerian anomalies are very common, and a frequent cause of infertility. The most used classification system until now, proposed by the American Society for Reproductive Medicine in 1988, categorizes comprehensively uterine anomalies but fails to classify defects of the cervix or vagina. This is based on a developmental theory that postulates that müllerian duct fusion is unidirectional, begin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014