854 research outputs found

    A Survey on Data Deduplication

    Get PDF
    Now-a-days, the demand of data storage capacity is increasing drastically. Due to more demands of storage, the computer society is attracting toward cloud storage. Security of data and cost factors are important challenges in cloud storage. A duplicate file not only waste the storage, it also increases the access time. So the detection and removal of duplicate data is an essential task. Data deduplication, an efficient approach to data reduction, has gained increasing attention and popularity in large-scale storage systems. It eliminates redundant data at the file or subfile level and identifies duplicate content by its cryptographically secure hash signature. It is very tricky because neither duplicate files don?t have a common key nor they contain error. There are several approaches to identify and remove redundant data at file and chunk levels. In this paper, the background and key features of data deduplication is covered, then summarize and classify the data deduplication process according to the key workflow

    A DUPLICATE ACTIVE STORAGE INDEXES FOR MULTIPLE CLIENT ENVIRONMENTS

    Get PDF
    As opposed to the present authenticated structures, for example skip list and Merkle tree, we design a singular authenticated structure known as Homomorphic Authenticated Tree, we present additional information about PoS and dynamic PoS. Whenever a verifier wants to determine the integrity of the file, it at random selects some block indexes from the file, and transmits these to the cloud server. To the very best of our understanding, no existing dynamic PoSs supports this method. We developed a novel tool known as HAT which is an excellent authenticated structure. We suggested the excellent needs in multi-user cloud storage systems and introduced the type of deduplicatable dynamic PoS. Existing dynamic PoSs can't be extended towards the multi-user atmosphere. Because of the problem of structure diversity and tag generation, existing system can't be extended to dynamic PoS. An operating multi-user cloud storage system needs the secure client-side mix-user deduplication technique, which enables a person to skip the uploading process and acquire the possession from the files immediately, when other proprietors of the identical files have submitted these to the cloud server. to lessen the communication cost both in the evidence of storage phase and also the deduplication phase concentrating on the same computation cost. We prove the safety in our construction, and also the theoretical analysis and experimental results reveal that our construction is efficient used. Within this paper, we introduce the idea of deduplicatable dynamic evidence of storage and propose a competent construction known as DeyPoS, to attain dynamic PoS and secure mix-user deduplication, concurrently

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view

    Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage

    Get PDF
    The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud provider. As the survey shows 56% of the usages of cloud storage applications are for data back up and up to 68% of data backup are user assets. Enterprise tenants would need to protect their data privacy before uploading them to the cloud and expect a reasonable performance while they try to reduce the operation cost in terms of cloud storage, capacity and I/Os matter as well as systems’ performance, bandwidth and data protection. Thus, enterprise tenants demand secure and economic data storage yet flexible access on their cloud data. In this paper, we propose a secure de-duplication solution for enterprise tenants to leverage the benefits of cloud storage while reducing operation cost and protecting privacy. First, the solution uses a proxy to do flexible group access control which supports secure de-duplication within a group; Second, the solution supports scalable clustering of proxies to support large-scale data access; Third, the solution can be integrated with cloud storage seamlessly. We implemented and tested our solution by integrating it with Dropbox. Secure de-duplication in a group is performed at low data transfer latency and small storage overhead as compared to de-duplication on plaintext
    • …
    corecore