Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract
Cloud computing provides a more cost effective environment
to outsource storage computation. Many enterprises need to
store and operate huge amount of data. One serious problem
of todays cloud storage service is the management of everincreasing volume of data. To make data management elastic
in cloud computing de-duplication system is used. Data deduplication is a compression technique that improves storage
efficiency by eliminating redundant data. In this approach we
have proposed a de-duplication technique which is different
from traditional de-duplication system. In this system users
with differential privileges are also consider in duplicate
check which was not possible in previous de-duplication
system. Again in this approach we also focus on the
confidentiality of sensitive data in support of de-duplication.
We are proposing a Hybrid cloud approach. In Hybrid cloud
approach two cloud are maintained, public cloud and a
private cloud. A private cloud is working as an interface
between user and public cloud. Private cloud provides a set of
private key to the user. We also presented several new deduplication constructions supporting authorized duplicate
check in hybrid cloud architecture.
1. INTRODUCTION
Cloud storage is gaining popularity in recent years. Cloud
computing is a model for delivering information
technology services in which resources are retrieved from
the internet through web-based tools and application,
instead of direct connection to a server. Cloud provides
scalable, location independent infrastructure for data
management in storage. To make data management
scalable in cloud computing, de-duplication has been a
well-known technique and has attracted more and more
attention recently. Data de-duplication is a technique that
stores only a single copy of redundant data, and provides
links to that copy instead of storing other actual copies of
that data. By storing and transmitting only a single copy
of duplicate data, de-duplication offers savings of both
disk space and network bandwidth. De-duplication is
either file level or block level. In file level de-duplication
duplicate copy of same file is eliminated and in block level
duplicate block of data is eliminated. The main issue with
data de-duplication is security and privacy as users
sensitive data are susceptible to both insider and outsider
attacks. Tradition encryption, while provide data
2. MOTIVATION
Cloud storage services are becoming very popular now a
day. Cloud provides a better way of storage with efficient
cost. One major problem with cloud is to manage huge
amount of data. In order to manage data de-duplication
technique is used. Although, de-duplication has many
advantages but it has some security issues. This motivates
us to propose a model which manage the security issues of
de-duplication and provide authorized de-duplication in
cloud.
Page 147
4. COMPARATIVE STUDY
References
[1] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee,
Wenjing Lou, A Hybrid Cloud Approach for Secure
Authorized De-duplication,IEEE Transactions on
Parallel and Distributed System, vol. PP, no.99, 2014.
[2] J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl,
A secure data de-duplication scheme for cloud
storage, In Technical Report, 2013.
[3] S. Halevi,D. Harnik,B. Pinkas and A. Shulman-Peleg,
Proofs of ownership in remote storage systems, In
Y. Chen,G. Danezis, and V.Shmatikov. ACM
Conference on Computer and Communications
Security, pages 491500. ACM, 2011.
[4] M. W. Storer, K. Greenan, D. D. E. Long, and E. L.
Miller, Secure data de-duplication, In Proc. of
StorageSS, 2008.
[5] W. K. Ng, Y. Wen and H. Zhu, Private data deduplication protocols in cloud storage, In S.
Ossowski and P. Lecca, editors, Proceedings of the
27th Annual ACM Symposium on Applied
Computing, pages 441446, ACM, 2012.
[6] S. Bugiel, S. Nurnberger, A. Sadeghi and T.
Schneider, Twin clouds: An architecture for secure
cloud computing, In Workshop on Cryptography
and Security in Clouds (WCSC 2011), 2011
[7] J. R. Douceur,A. Adya, W. J. Bolosky, D. Simon and
M. Theimer,Reclaiming space from duplicate files in
a serverless distributed file system, In ICDCS, pages
617624, , 2002.
[8] I. Clarke, O. Sandberg, B. Wiley, and T. Hong,
Freenet: A Distributed Anonymous Information
Page 150
[22] Deepa
Karunakaran
and
Rangarajan
Rangaswamy,Optimization Techniques To Record
Deduplication, In Journal of Computer Science 8 (9):
1487-1495, 2012.
[23] S. Quinlan and S. Dorward,Venti: a new approach to
archival storage, In Proc. USENIX FAST, Jan 2002.
[24] Jingxin Feng and Jiri Schindler, A Deduplication
Study for Host-side Caches in Virtualized Data
Center Environments, In IEEE computer, 2013.
[25] Pasquale Puzio, Refik Molva, Melek nen, Sergio
Loureiro,ClouDedup: Secure Deduplication with
Encrypted Data for Cloud Storage, In IEEE
CloudCom, 2013.
[26] Nesrine Kaaniche and Maryline Laurent,A Secure
Client Side Deduplication Scheme in Cloud Storage
Environments, IFIP International Conference on
New Technologies, Mobility and Security, 2014.
[27] C. Wang, Z. guang Qin, J. Peng, and J. Wang,A
novel encryption scheme for data deduplication
system, In Communications, Circuits and Systems
(ICCCAS), 2010 International Conference on, pages
265269, ,2010
[28] Yufeng Wang, Chiu C Tan, Ningfang Mi,Using
Elasticity to Improve Inline Data Deduplication
Storage Systems, IEEE International Conference on
Cloud Computing (CLOUD), AK, USA, 2014.
[29] K. Zhang, X. Zhou, Y. Chen, X.Wang, and Y. Ruan,
Sedic: privacy aware data intensive computing on
hybrid clouds, In of the 18th ACM conference on
Computer and communications security,CCS11,
pages 515526, New York, NY, USA. ACM, 2011.
[30] Qingji Zheng, Shouhuai Xu,Secure and Efficient
Proof of Storage with Deduplication, Proc. of ACM
conference on Data and Application Security and
Privacy, 2012.
AUTHOR
Prachi D Thakar received B.E
(Computer Science & Engineering) from
SGB Amravati University in 2010 and
pursuing M.E.(Computer Engineering)
from SGB University. Right now working
as a lecturer in the Dept. of First Year
Engineering at Prof. Ram Meghe College of Engineering
& Management, Badnera Amravati.
Dinesh G Harkut received B.E.
(Computer Science & Engineering)
& M.E. (Computer Science &
Engineering) from SGB Amravati
University in 1991 and 1998
respectively. He completed his masters in Business
Management and obtained his Ph.D. from SGB Amravati
University in Business Management in 2013 while serving
as a full-time faculty in the Dept. of Computer Science &
Engineering at Prof Ram Meghe College of Engineering
& Management, Badnera Amravati. His research
interests are Embedded Systems and RTOS
Page 151