Cloud Based Data Deduplication with Secure Reliability

نویسنده

  • M. SWARNA
چکیده

IJRAET Abstract— To eliminate duplicate copies of data we use data de-duplication process. As well as it is used in cloud storage to minimize memory space and upload bandwidth only one copy for every file stored in cloud that can be used by more number of users. Deduplication process helps to improve storage space. Another challenge of privacy for sensitive data also arises. The aim of this paper is to create the primary attempt formalize the concept of distributed reliable deduplication system. In our proposed system we are planning to develop new distributed de-duplication systems that are highly reliable. In de-duplication method data chunks are distributed across multiple cloud servers rather than using convergent encoding as in previous de-duplication systems we use deterministic secret sharing scheme in distributed storage systems. So we can reach the required concepts for security that are data privacy and tag reference in the proposed security model, Security analysis express that our deduplication systems are secure. Index Terms−System model, Secure-Cloud Storage Provider, Data De-duplication, Secret Sharing, Filelevel De-duplication, Block-level De-duplication INTRODUCTION In our proposed system we are aiming to use data deduplication process. Initial we should know what is data de-duplication, it reduces the quantity of data that has to be physically stored by eliminating extra data and replacing when repetition of it with a reference to the original. In data de-duplication we remove unwanted copy of data and save the memory area. With the use of de-duplication method reliability is improved moreover because it avoids wastage of memory space .Secure means that in our system we use encryption and decryption techniques. Encryption means that convert plane text into encoded text this techniques known as an encryption. This encoded text is transfer to server CS1, CS2, CS3. Again this encoded text is converted into plane text referred to as decryption techniques. Distributed means that we create server CS2,CS2,CS3 from this server user select any one, from server choice data was distributed data de-duplication means delete duplicate copy in which use two techniques initial one is Cloud Based Data Deduplication with Secure Reliability

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

Received Jun 29, 2017 Revised Nov 23, 2017 Accepted Dec 17, 2017 The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may origin animmense loss to the enterprises. Duplication detection plays a very main role in data management. Data...

متن کامل

Data De-Duplication Correction and Secure Key Authentication in Cloud

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption prac...

متن کامل

The Secure Integrity Verification in Cloud Storage Auditing with Deduplication

The cloud computing innovation appeared amid the21st century; outsourcing data to cloud benefit for capacity turns into a helpful yet proficient pattern, which benefits in saving endeavors on data support and administration. By the by, since the outsourced cloud stockpiling administration is not completely reliable, it raises security worries on the most proficient method to acknowledge data de...

متن کامل

Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing

Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...

متن کامل

PerfectDedup: Secure Data Deduplication

With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges. We propose PerfectDedup, a novel scheme for secure data deduplication, which takes into...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016