Secure Authorised De-duplication using Convergent Encryption Technique
ثبت نشده
چکیده
Sangeetha. B Department of computer science, Anna University, Chennai-63, Tamilnadu, India E-mail: [email protected] Mr.E.S.K.Vijay Anand Assistant Professor, Anna University, Chennai-63, Tamilnadu, India E-mail: [email protected] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------Cloud computing means retrieve and storing information and programs over the Internet instead of your computer's hard drive. To protect confidentiality of the perceptive data while supporting de-duplication data is encrypted by the projected convergent encryption method before out sourcing. It makes the first attempt to properly address the problem of authorized data deduplication. We also present some new deduplication constructions supporting authorized duplicate in cloud using symmetric algorithm. Data deduplication is one of the techniques which used to solve the repetition of data. The deduplication techniques are commonly used in the cloud server for reducing the space of the server. To prevent the unauthorized use of data accessing and generate duplicate data on cloud the encryption technique to encrypt the data before stored on cloud server.
منابع مشابه
Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage
One very important challenges of today’s cloud storage services is that the management of the ever-increasing amount of data. To create data management scalable, de-duplication has been a widely known technique to condense space for storing and transfer information measure in cloud storage. Rather than keeping multiple data copies with an equivalent content, de-duplication eliminates redundant ...
متن کاملImplementation of a File System with Encryption and De-duplication
With the rapid advance of society, especially the development of computer technology, network technology and information technology, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. In this paper, we propose a prototype file system called EDFS (Encryption and De-duplication File System), which provides both data security and space effici...
متن کاملData De-Duplication Correction and Secure Key Authentication in Cloud
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption prac...
متن کاملCloud Based Data Deduplication with Secure Reliability
IJRAET Abstract— To eliminate duplicate copies of data we use data de-duplication process. As well as it is used in cloud storage to minimize memory space and upload bandwidth only one copy for every file stored in cloud that can be used by more number of users. Deduplication process helps to improve storage space. Another challenge of privacy for sensitive data also arises. The aim of this pap...
متن کاملBlock-level De-duplication with Encrypted Data
Deduplication is a storage saving technique which has been adopted by many cloud storage providers such as Dropbox. The simple principle of deduplication is that duplicate data uploaded by different users are stored only once. Unfortunately, deduplication is not compatible with encryption. As a scheme that allows deduplication of encrypted data segments, we propose ClouDedup, a secure and effic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016