Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
e-ISSN: 2455-5703
I. INTRODUCTION
In the current IT environment every organization is need to invest time and budget to scale up the IT infrastructure such as
hardware, software and services. Cloud computing provides computing over the internet. Cloud services consist of highly
optimized virtual Data Center that provides various software, hardware and information resource to the needful users. The
organization can simply connect to the cloud and use the available resource on pay per user basis. This helps the company to avoid
capital expenditure on additional on premise Infrastructure resource and instantly scale up or scale down according to business
requirements[1].
Data DE duplication [Fig 1.] is very essential in todays world to achieve bandwidth optimization and to lower the storage
space by eliminating redundant data copies[2].
145
2)
146
147
Existing Model
Proposed Model
4
3
2
1
om
pl
ia
nc
e
os
t
In
te
gr
i ty
Se
cu
rit
y
Ea
se
of
U
se
on
fi d
en
ti a
li t
y
From these results [Fig 3.] the data integrity and security is enhanced further in hybrid cloud with data stored in an encrypted
format. The partition of application data into fragments allows sharing fine grained fragments of data in multi cloud. The ease of
accessibility is highly increased by deploying the model in a hybrid cloud environment. The cost incurred in maintaining the data
integrity is high.
VI. CONCLUSION
The notion of authorized data DE duplication was proposed to protect the data security by including differential privileges of users
in the duplicate check. Several new DE duplication constructions supporting authorized duplicate check in hybrid cloud
architecture, in which the duplicate-check tokens of files are generated by the private cloud server with private keys. The private
cloud act as an interface between the public cloud and the user. The data is encrypted and send across multiple cloud servers to
enhance data security. Data integrity check is done by private cloud server and make the system more secure.
148
REFERENCES
[1] Ahamed K.Elmagarmid, Panagiotis G. Ipeirotis, Vassilios S. Verykios. (2007), Duplicate Record Detection: A Survey, IEEE
Transactions on Knowledge and Data Engineering, Vol. 19, No. 1, pp.1-16.
[2] Anderson P and Zhang L. (2010), Fast and secure laptop backups with encrypted de-duplication, In Proc. of USENIX LISA.
[3] Bellare M,Keelveedhi S, and Ristenpart T. (2013), Dupless: Server Aided encryption for deduplicated storage, In USENIX
Security Symposium, pp. 179-194.
[4] Bellare M,Keelveedhi S, and Ristenpart T. (2013), Message-locked encryption and secure deduplication, In EUROCRYPT,
pp.296 312.
[5] Bellare M, Namprempre C, and Neven G. (2008),Security proofs for identity-based identification and signature schemes,
Journal of Cryptology, Vol. 22, No. 1, pp. 161.
[6] Bugiel S, Nurnberger S, Sadeghi A, and Schneider T. (2011), Twin clouds: An architecture for secure cloud computing, In
Workshop on Cryptography and Security in Clouds, pp. 32-44.
[7] Chang Liu, Rajiv Ranjan, Chi Yang ,Xuyun Zhang.(2015),MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree
Based Secure Public Auditing for Dynamic Big Data Storage on Cloud,IEEE Transactions on Computers, Vol. 64 , No 9, pp
2609 2622.
[8] Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng.(2014),KeyAggregatecryptosystem for Scalable Data Sharing in Cloud Storage, IEEE Transactions on Parallel and Distributed Systems,
Vol. 25, No 2, pp. 468 477.
[9] Douceur J R , Adya A, Bolosky W J, Simon D, and Theimer M. (2002), Reclaiming space from duplicate files in a serverless
distributed file system, In ICDCS, pp 617624.
[10] Ferraiolo D and Kuhn R. (1992), Role-based access controls, In 15th NIST-NCSC National Computer Security Conf.,.
[11] Halevi S,Harnik D,Pinkas B,Ra Shulman-peleg. (2011), Proof of ownership in remote storage systems, ACM Conference
on Computer and Communications Security, pp. 491-500.
[12] Huang, Ming Xian, Shaojing Fu, Jian Liu. (2014), Securing the cloud storage audit service: defending against frame and
collude attacks of third party auditor , IET Communications, Vol. 8, No 12, pp. 2106 2113.
[13] Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, and Ninja Marnau. (2013), Security and Privacy
Enhancing Multicloud Architectures, IEEE Transaction on Dependable and Secure Computing, Vol. 10, No. 4, pp. 212
224.
[14] Jia Yu, Kui Ren, Cong Wang. (2016),Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates, IEEE
Transactions on Information Forensics and Security, Vol. PP , No 99, pp. 1.
[15] JingweiLi, Xie, D.,Cai, Z. (2015), Secure Auditing and Deduplicating data in Cloud, IEEE Transaction on Computers, Vol.
PP, No. 99, pp. 1.
[16] Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli. (2015), Secure Deduplication storage systems supporting keyword
search, Journal of Computer and System Sciences-ACM, Vol. 81, No. 8, pp.1532- 1541.
[17] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C, Lee and Wenjing Lou.(2014). Secure Deduplication with
Efficient and Reliable Convergent Key Management, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No.
6, pp.1615-1625.
[18] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. (2015), A Hybrid Cloud Approach for Secure Authorized
Deduplication, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 5, pp.1206 1216.
[19] Li J., Chen X., Huang X., Tang S., Xiang Y., Hassan M, Alelaiwi. (2015), Secure Distributed Deduplication Systems with
Improved Reliability, IEEE Transactions on Computers, Vol. PP, No. 99, pp.1.
[20] Li Chaoling, Chen Yue, Zhou Yanzhou. (2014), A Data assured deletion scheme in cloud storage, IEEE Transactions on
Communications, Vol.11, No.4, pp 98-110.
[21] Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino. (2014), An Efficient Certificate less Encryption for Secure
Data Sharing in Public Clouds ,IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 9, pp 2107 2119.
149