Secure Manipulation of Deduplicated Data for Cloud Storage
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 12)Publication Date: 2015-12-05
Authors : Renuka Devi S; Eldo P Elias;
Page : 1036-1040
Keywords : Deduplication; Cloud Storage; Convergent Encryption;
Abstract
Cloud storage enables to configure and use online storage devices as storage targets. The increasing demand of cloud storage requirement has led to the process of deduplication. The term data deduplication refers to the techniques that store single copy of redundant data, and provide links to that copy instead of storing other actual copies of this data. Deduplication enables to reduce cloud storage space usage and uses network bandwidth efficiently. Convergent encryption technique is used to implement deduplication in the cloud storage, but it introduces new security threats. There comes the need of secure deduplication. Security of the proposed system relies on a proxy server which applies additional encryption on the uploaded data, this protects the data against convergent encryption attacks. System also includes a deduplication manager which deals with block level deduplication. Any cloud storage provider can be easily integrated in the new architecture. The system is implemented with the help of JAVA programming language, SQL database and Amazon s3 cloud service and the results are analyzed.
Other Latest Articles
- Secure and Economical Information Transmission for Clustered Wireless Sensor Network
- Effect of SIM on Knowledge Regarding Computer Vision Syndrome and its Prevention among Computer Professionals: A Quasi Experimental Approach
- Discrete Affinity Matrices for Automatic Face Labeling
- Security Issues with Health Care Information Technology
- The Negative Impact of Social Networking Sites on College Students? Time, and Education
Last modified: 2021-07-01 14:28:06