Efficient Deduplication with Security Using Jenkins and Recovery Techniques
نویسندگان
چکیده
Data deduplication is a method of tumbling stowage needs by eliminating redundant data. Only one unique occasion of the data is actually retained on storage broadcasting. Redundant data is replaced with a pointer to the unique data copy and it has been widely used in cloud packing to reduce the amount of storage space and save bandwidth. To protect the concealment of sensitive data while supporting deduplication, Jenkins hash function (JHF) techniques has been proposed to encrypt the data before outsourcing. To enhanced protect data security, it makes the first endeavour to formally address the problem of authorized data deduplication. The several deduplication techniques are implemented in hybrid Cloud architecture. In additionally implement the Log-based Recovery technique in hybrid cloud. Our proposed system is implemented for text file, pdf file, book,image and video, it also verify the confidentiality of private cloud. Simulation result shows that the proposed system authorized duplicate check scheme incurs minimal overhead when compared to normal operations and also it decreases the authorization parameters to above 60%.
منابع مشابه
Efficient and Secure File Deduplication in Cloud Storage
Outsourcing to a cloud storage brings forth new challenges for the efficient utilization of computing resources as well as simultaneously maintaining privacy and security for the outsourced data. Data deduplication refers to a technique that eliminates redundant data on the storage and the network, and is considered to be one of the most-promising technologies that offers efficient resource uti...
متن کاملAn Enhanced Multi-Layered Cryptosystem Based Secure and Authorized Deduplication Model in Cloud Storage System
Data deduplication is an important technique for eliminating redundant data. Instead of taking no. of same files, it store only single copy of file. In most organizations, storage system contains many pieces of duplicate data. For example, the same file may be saved in several different places by different users. Deduplication eliminates these extra copies by saving just one copy of the data an...
متن کاملProof of ownership for deduplication systems: A secure, scalable, and efficient solution
Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files would be sufficient. Albeit simple in theory, the implementation of this concept introduces many security risks. In this paper, we address the most se...
متن کاملA Survey On: Secure Data Deduplication on Hybrid Cloud Storage Architecture
Data deduplication is one of the most important Data compression techniques used for to removing the duplicate copies of repeating data and it is widely used in the cloud storage for the purpose of reduce the storage space and save bandwidth. To keep the confidentiality of sensitive data while supporting the deduplication, to encrypt the data before outsourcing convergent encryption technique h...
متن کاملDCT Image Compression and Secure Deduplication with Efficient Convergent Key Management
As our use and reliance of computer grows day by day we need an efficient way to manage our large amount of data. Sometimes a person has to use large amount of images like webpages or catalogs need to use some techniques for image compression. This is because the amount of space required to hold large amount of image can be prohibitively large in terms of cost. Fortunately we have several metho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015