A Survey on Secure and Authorized Data Deduplication
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Shweta Pochhi; Vanita Babanne;
Page : 1696-1698
Keywords : deduplication; Convergent Encryption; Proof of ownership; Authorized Duplicate Check; Differential Authorization;
Abstract
Data deduplication looks for redundancy of sequences of bytes across very large comparison windows. Sequences of data (over 8 KB long) are compared to the history of other such sequences and it is ideal for highly redundant operations like backup which requires repeatedly copying and storing the same data set multiple times for recovery purpose. To protect the confidentiality of sensitive data while supporting deduplication, convergent encryption technique has been designed to encrypt the data. Convergent encryption enables duplicate files to coalesced into the space of a single file, even the files are encrypted with different users keys. To overcome attacks, the notion of proofs-of-ownership (PoWs) has been introduced, which lets a client proficiently prove to a server that the client holds a file.
Other Latest Articles
- Effectiveness of Performance Contracting in Public Institutions in Nakuru County - A Case Study of the Provincial General Hospital
- A Survey on Enhanced Energy Efficient Data Gathering Scheme in Wireless Sensor Network
- Relationship between Demographic Characteristics of Refugee Pupils and Academic Performance in Eldoret Municipality, Uasin-Gishu County, Kenya
- Effects of Concentration on the Properties of Zn-Doped Cadmium Sulphide Thin Films
- High Speed Vedic Multiplier for 16 Bits Numbers
Last modified: 2021-06-30 21:12:54