ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Secure Approach for Deduplication using Hybrid Cloud

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)

Publication Date:

Authors : ;

Page : 1777-1781

Keywords : convergent encryption; deduplication; key generation; storage service provider; proof of ownership;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the condentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this study makes the rst attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself, also several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the denition specied in the proposed security model and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

Last modified: 2021-06-30 21:46:31