An In-Depth Analysis of the Implementation of the Hybrid Cloud for Deduplication and Enhancing of the Secure Cloud Features and Safeguards
Ishaan Gupta
Vol. 6, Issue 1, Jan-Dec 2020
Page Number: 107 - 113
Abstract:
Information Deduplication is a procedure for reducing the extra space an affiliation needs to save its information. In numerous associations, the limit structures contain copy copies of multiple pieces of information. For example, different customers may keep a comparative record in a couple of better places, or possibly two archives that aren't unclear may, regardless, join an incredible piece of relative information. Deduplicate renounces these additional duplicates by saving only one data replication and supplanting substitute duplicates with pointers that lead back to the essential record. Affiliations regularly use Deduplication in help and upheaval recuperation applications; nevertheless, it will, in general, be utilized to give open space access to the essential gathering. To sidestep this duplication of data and keep up the community in the cloud, we use the chance of a Hybrid cloud. The joined encryption method has been proposed to encode the data before revaluating to ensure the assurance of delicate information while supporting Deduplication. To all the almost certain assurance data security, this paper makes the chief endeavour to determine the issue of supported data Deduplication formally
References
- C. Ng and P. Lee. Revdedup: A reverse deduplication storage system optimized for reads to latest backups. In Proc. of APSYS,Apr 2013.
- J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013.
- J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure datadeduplication scheme for cloud storage. In Technical Report, 2013
- J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In ASIACCS,pages 195–206, 2013.
- J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.
- K. Zhang, X. Zhou, Y. Chen, X.Wang, and Y. Ruan. Sedic: privacy aware data intensive computing on hybrid clouds. In Proceedings of the 18th ACM conference on Computer and communications security,CCS’11, pages 515– 526, New York, NY, USA, 2011. ACM.
- M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
- M. Bellare, S. Keelveedhi, and T. Ristenpart. Messagelocked encryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
- M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data deduplication. In Proc. of StorageSS, 2008
- P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.
- R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81– 82. ACM, 2012.
- S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC2011), 2011.
- S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.
- W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441– 446. ACM, 2012.
- Z. Wilcox-O’Hearn and B. Warner. Tahoe: the least authority filesystem. In Proc. of ACM Storage SS, 2008.
Back Download