Encrypted De-duplication over Distributed Cloud Server
DOI:
https://doi.org/10.14419/ijet.v7i3.12.16124Published:
2018-07-20Keywords:
Deduplication, distributed cloud, Chunking, M3 AlgorithmAbstract
The most common cloud service is Data Storage. In order to reduce the storage space, deduplication is used. Data deduplication is a process of removing redundant copies of same data. If a file which is already present in the cloud, is uploaded by the same user or different user, then it will not be uploaded again. Therefore storage required is decreased but reliability is also reduced. Data are encrypted and stored in cloud to protect the privacy of users and this introduces new challenges. The proposed system uses M3 algorithm for encryption and Chunking technique for deduplication. The results of the evaluation show that the security and reliability are increased in the proposed scheme.
References
[1] Bellare M., Keelveedhi S., Ristenpart T. “Message-Locked Encryption and Secure Deduplication†Springer, 2013.
[2] J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee and W. Lou, "Secure Deduplication with Efficient and Reliable Convergent Key Management," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615-1625, June 2014.
[3] M. Ajdari, P. Park, D. Kwon, J. Kim and J. Kim, "A Scalable HW-Based Inline Deduplication for SSD Arrays," in IEEE Computer Architecture Letters, vol. 17, no. 1, pp. 47-50, Jan.-June 1 2018.
[4] H. Kwon, C. Hahn, D. Koo and J. Hur, "Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage," 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, CA, 2017, pp. 391-398.
[5] G. Grangia, Q. Xu, A. Bianco and P. Giaccone, "Balancing the Storage in a Deduplication Cluster," 2017 International Conference on Networking, Architecture, and Storage (NAS), Shenzhen, 2017, pp. 1-4.
[6] Y. Wu, Z. L. Jiang, X. Wang, S. M. Yiu and P. Zhang, "Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage," 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, 2017, pp. 562-567.
[7] Z. Yan, W. Ding, X. Yu, H. Zhu and R. H. Deng, "Deduplication on Encrypted Big Data in Cloud," in IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, June 1 2016.
[8] Z. Yan, M. Wang, Y. Li and A. V. Vasilakos, "Encrypted Data Management with Deduplication in Cloud Computing," in IEEE Cloud Computing, vol. 3, no. 2, pp. 28-35, Mar.-Apr. 2016.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-07-23
Published 2018-07-20