A Secure Approach for Deduplication using Hybrid Cloud
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)Publication Date: 2015-05-05
Authors : Yusuf Aliyu Adamu;
Page : 1777-1781
Keywords : convergent encryption; deduplication; key generation; storage service provider; proof of ownership;
Abstract
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the condentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this study makes the rst attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself, also several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the denition specied in the proposed security model and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Other Latest Articles
- Survey of Mathematical Programming and Related Concepts
- Modelling of An Industrial Blast Furnance Using Finite Element Method
- Effect of Changing Landscapes on Diversity, Distribution and Relative Abundance of Insect Pollinators on Apple Crop in Northwest Himalayas
- A Case Series on Evisceration with Mules PMMA Implant
- MRI Image Enhancement
Last modified: 2021-06-30 21:46:31