Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
Journal: International Journal of Computer Techniques (Vol.2, No. 2)Publication Date: 2015-03-01
Authors : Siva Ramakrishnan S; Vinoth Kumar P;
Page : 40-44
Keywords : cloud computing; Deduplication; Convergent Encryption; Shared Storage; Dedicated Storage;
Abstract
In the advent of cloud computing technology, more and more customers are adopting a Cloud based approach for their infrastructure requirements which is being offered as an Infrastructure as a service model (IAAS).We will be presenting a model consisting of shared and dedicated storage which is differentiated by the cost involved in the services as well as the security mechanisms involved. Users can store the files either in a dedicated storage spaces which is highly secure as it is not physically shared among any other cloud users or opt to store the files securely in a shared storage along with files from other cloud users. The infrastructure involves both dedicated and shared storage spaces, the user has the option to mandatorily store the file only in the dedicated storage or leave it to the system to decide the services to be used. In a cloud scenario security is a major concern as multiple users may use the same infrastructure. So we present an approach where we encrypt the data with a convergent key which is obtained by hashing the data copy. The users can retain the keys and send the cipher text to cloud after the key generation and encryption. Multiple users who own the same file would generate the same hash value, convergent key and the same cipher text. Users are provided with a pointer from the server, so the user need not upload the same file again.
Other Latest Articles
- PROFICIENT APPROACH OF DATA INTEGRITY PROTECTION IN CLOUD STORAGE USING REGENERATING CODE
- PRIVACY ENHANCING AND PROTECTED DISTRIBUTED OF PERSONAL HEALTH RECORD USING ABE
- Service Delegating Log Management-For Secure Logging In Cloud Environment
- Role of Mobile Cloud Applications and Challenges in BYOD
- NEO WSN: Network Lifetime Enhancement with OSPFV3 Authentication Scheme in Wireless Sensor Networks
Last modified: 2015-07-09 15:27:48