Secure Data Deduplication by Using Convergent Key Technique

  • Authors

    • Mr B.Tirapathi Reddy
    • Ms K.V. Padmasree
    • Mr K KrishnaKanth
    • Mr Dushyanth KumarReddy
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15741
  • Data de-duplication, convergent encryption, key managing, convergent key, data.
  • Data de-duplication is the significant system used for removal the repetitive copy of information and broadly use in cloud storage to decrease and upload bandwidth. Our main motto be toward accomplish safe de-duplication within cloud. Convergent encryption has been utilized for safe de-duplication, complication is having colossal number of convergent keys. We will be utilizing base line approach in which each of the user have their own masterkey for encrypting their convergent keys also send them to cloud. This approach produces huge amount of keys with increment in amount of user and it needs help of user to look after master keys. At ending we will have De-key in which users need not deal with the key on their individual except steadily circulate convergent key among many servers.

     

     

  • References

    1. [1] D. Harnik, B. Pinkas, and A. Shulman-Peleg, ‘‘Side Channels in Cloud Services: Deduplication in Cloud Storage,’’ IEEE Security Privacy, vol. 8, no. 6, pp. 40-47, Nov./Dec. 2010.

      [2] W.K. Ng, Y. Wen, and H. Zhu, ‘‘PrivateData Deduplication Protocols in CloudStorage,’’ in Proc. 27th Annu. ACM Symp.Appl. Comput., S. Ossowski and P. Lecca, Eds., 2012, pp. 441-446.

      [3] Q. Wang, C. Wang, K. Ren, W. Lou, andJ. Li, ‘‘Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,’’ IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.

      [4] Y. Tang, P.P. Lee, J.C. Lui, and R.Perlman, ‘‘Secure Overlay Cloud Storage with Access Control and Assured Deletion,’’IEEE Trans. Dependable Secure Comput., vol. 9, no. 6, pp. 903-916,Nov./Dec. 2012.

      [5] A.D. Santis and B. Masucci, ‘‘Multiple Ramp Schemes,’’ IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1720-1728, July 1999.

      [6] J.S. Plank and L. Xu, ‘‘OptimizingCauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications,’’ in Proc. 5th IEEE Int’l Symp. NCA,Cambridge, MA, USA, July 2006, pp. 173-180.

      [7] W.K. Ng, Y. Wen, and H. Zhu, ‘‘Private Data Deduplication Protocols in Cloud Storage,’’ in Proc. 27th Annu. ACM Symp.Appl. Comput., S. Ossowski and P. Lecca, Eds., 2012, pp. 441-446.

      [8] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing Lou IEEE Transaction on parallel and distrubuted systems, vol. 25, no. 6, june 2014.

      [9] A. Rahumed, H.C.H. Chen, Y. Tang,P.P.C. Lee, and J.C.S. Lui, ‘‘A secure Cloud Backup System with Assured Deletion and Version Control,’’ in Proc. 3rd Int’l Workshop Security Cloud Computing., 2011, pp. 160-167.

      [10] G. Wallace, F. Douglis, H. Qian, P.Shilane, S. Smaldone, M. Cham- ness, and W. Hsu., “Characteristics of Backup Workloads in Production Systems†in Proc. 10th USENIX Conf. FAST, 2012, pp. 1-16..

      [11] W. Wang, Z. Li, R. Owens, and B. Bhargava, â€Secure and Efficient Access to Outsourced Data†in Proc. CM CCSW, Nov. 2009, pp. 55-66.

  • Downloads

  • How to Cite

    B.Tirapathi Reddy, M., K.V. Padmasree, M., K KrishnaKanth, M., & Dushyanth KumarReddy, M. (2018). Secure Data Deduplication by Using Convergent Key Technique. International Journal of Engineering & Technology, 7(2.32), 459-460. https://doi.org/10.14419/ijet.v7i2.32.15741