An Approach for Secure Distributed Deduplication System
نویسندگان
چکیده
منابع مشابه
Distributed Key Generation for Secure Encrypted Deduplication
Large-scale storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the copies of redundant data to save space, a process called deduplication; and (2) users demand encryption of their data to ensure privacy. Conventional encryption makes deduplication on ciphertexts ineffective, as it destroys data redundancy. A line of work, originated from Con...
متن کاملAn evaluation of recent secure deduplication proposals
Deduplication is widely used by cloud storage providers to cut costs, by storing and uploading a single instance of identical files shared across multiple user accounts. However, cross-account deduplication introduces several new side-channel attacks on user privacy; see e.g., Harnik et al. (IEEE Security and Privacy Magazine, 2010), Mulazzani et al. (USENIX Security, 2011). As a response, seve...
متن کاملPerfectDedup: Secure Data Deduplication
With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges. We propose PerfectDedup, a novel scheme for secure data deduplication, which takes into...
متن کاملMemory Deduplication: An Effective Approach to Improve the Memory System
YUHUI DENG, XINYU HUANG, LIANGSHAN SONG,YONGTAO ZHOU AND FRANK WANG 1 Department of Computer Science, Jinan University, Guangzhou, 510632, P. R. China {[email protected];[email protected];[email protected];[email protected]} 2 Key Laboratory of Computer System and Architecture, Chinese Academy of Sciences, Beijing, 100190, P.R. China 3 School of Computing,University of Kent, CT27NF, UK fr...
متن کاملSecure Deduplication Scheme for Cloud Storage
Nowadays, the explosive growth of digital contents continues to rise the demand for new storage and network capacities, along with an increasing need for more cost effective use of storage and network bandwidth for data transfer. As such, the use of remote storage systems is gaining an expanding interest, namely the cloud storage based services, since it provides cost efficient architectures. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2017
ISSN: 0975-8887
DOI: 10.5120/ijca2017914940