ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Manipulation of Deduplicated Data for Cloud Storage

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 12)

Publication Date:

Authors : ; ;

Page : 1036-1040

Keywords : Deduplication; Cloud Storage; Convergent Encryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud storage enables to configure and use online storage devices as storage targets. The increasing demand of cloud storage requirement has led to the process of deduplication. The term data deduplication refers to the techniques that store single copy of redundant data, and provide links to that copy instead of storing other actual copies of this data. Deduplication enables to reduce cloud storage space usage and uses network bandwidth efficiently. Convergent encryption technique is used to implement deduplication in the cloud storage, but it introduces new security threats. There comes the need of secure deduplication. Security of the proposed system relies on a proxy server which applies additional encryption on the uploaded data, this protects the data against convergent encryption attacks. System also includes a deduplication manager which deals with block level deduplication. Any cloud storage provider can be easily integrated in the new architecture. The system is implemented with the help of JAVA programming language, SQL database and Amazon s3 cloud service and the results are analyzed.

Last modified: 2021-07-01 14:28:06