219 research outputs found

    Fast and secure laptop backups with encrypted de-duplication

    Get PDF
    Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure. Conventional backup solutions are not well suited to this environment, and backup regimes are frequently inadequate. This paper describes an algorithm which takes advantage of the data which is common between users to increase the speed of backups, and reduce the storage requirements. This algorithm supports client-end per-user encryption which is necessary for confidential personal data. It also supports a unique feature which allows immediate detection of common subtrees, avoiding the need to query the backup system for every file. We describe a prototype implementation of this algorithm for Apple OS X, and present an analysis of the potential effectiveness, using real data obtained from a set of typical users. Finally, we discuss the use of this prototype in conjunction with remote cloud storage, and present an analysis of the typical cost savings.

    Two Level Security for Cloud Storage with Data Deduplication

    Get PDF
    Cloud computing provides number of services to client over internet. Storage service is one of the important services that people used now days for storing data on network so that they can access their data from anywhere and anytime. With the benefit of storage service there is an issue of security. To overcome security problem the proposed system contain two levels of securities and to reduce the unwanted storage space de-duplication technique is involved. To increase the level of security one technique is a session password. Session passwords can be used only once and every time a new password is generated. To protect the confidentiality of sensitive data while supporting de-duplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. Symmetric key algorithm uses same key for both encryption and decryption. In this paper, I will focus on session based authentication for login, encryption for files and duplication check for reduce space of storage on cloud. DOI: 10.17762/ijritcc2321-8169.150612

    Secure Authorized Deduplication for Hybrid Cloud Storage

    Get PDF
    Cloud computing provides number of applications, as utilities in the internet .This applications create, configure and customize accessing referring the cloud computing as online utility. Cloud computing offers online data storage, infrastructure, services over networks and applications. Cloud storage is an widely popular offering of cloud computing. Cloud storage is used for increasing the number of users, access the users data from anywhere and also space for data storage in computing. Data deduplication means a type of data compression. This data compression to reduce its storage requirement using encoding of data. Data deduplication method used for replacement of multiple copies of data or eliminating duplicate copies of data. It also reduce storage space and save bandwidth. Deduplication is having one of the advantage for new security and privacy challenges with high cost. Basically, data deduplication means of reducing storage space in cloud. In this paper certain improves the speed of data deduplication with encrypted data reduces the cloud storage capacity of data. This paper first to show that addressing the problem of secure authorized data deduplication. Data deduplication works by eliminating data and ensuring that only one unique instance of data. Hence,Data deduplication is also called as single instance storage, because of the differential privilege of users considered in duplicate check. In this paper we implement that deduplication with encrypted data using SHA and MD5 algorithm for hybrid cloud storage

    An Improved Methodology for Information Repetition in Cloud with Authorization and Security

    Get PDF
    Cloud computing is the fastest growing technology in order to providing secure, reliable and fastest storage medium. Some of the examples of cloud computing is Google drive, Sandbox etc. These mediums provide the accessibility of data anywhere in the world. To address data repetition is one of the novel techniques. Repetition helps to remove and prevent from having duplicate copies of same data. Though repetition has several benefits it adds concerns related to privacy and security of users as it can lead to insider or outsider attacks. Achieving repetition along with data security in cloud environment makes it more critical problem to solve. Objective of this paper on Optima Authorized Data Repetition in Cloud is to mention the proposed system and analysis of repetition techniques and optimal authorization measures for security along with repetition technique in cloud environmen

    An Enhanced Multi-layered Cryptosystem Based Secure and Authorized De-duplicaton Model in Cloud Storage System

    Full text link
    Data de-duplication is one of the essential data compression techniques for eliminating duplicate copies of repeating data, and it has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the privacy of sensitive data while supporting de-duplication, the salt encryption technique has been proposed to encrypt the data before its outsourcing. To protect the data security in a better way, this paper makes the first attempt to formally address the problem of authorized data de-duplication. Different from traditional de-duplication systems, the derivative privileges of users are further considered in duplicate check besides the data itself. We also present various new de-duplication constructions which supports the authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that the scheme which we used is secure in terms of the definitions specified in the proposed security model. We enhance our system in security. Specially, we present a forward-looking scheme to support a stronger security by encrypting file with differential privilege keys. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations

    Optimal Data Deduplication In Cloud With Authorization

    Get PDF
    Cloud technology is widely used technology as it allows sharing and centralized storage of data, sharing of data processing and online access of computer services and resources on various types of devices. One of the critical challenges of cloud storage services is the management of the ever-increasing volume of data .To address these data deduplication is one of the novel technique. Deduplication helps to remove and prevent from having duplicate copies of same data. Though deduplication has several benefits it adds concerns related to privacy and security of users as it can lead to insider or outsider attacks. Achieving deduplication along with data security in cloud environment makes it more critical problem to solve. Objective of this paper on Optima Authorized Data Deduplication in Cloud is to mention the proposed system and analysis of deduplication techniques and optimal authorization measures for security along with deduplication technique in cloud environment DOI: 10.17762/ijritcc2321-8169.15073

    A Survey Paper on Secure Cloud De-Duplication Systems

    Get PDF
    With the unstable development of computerized information, de-duplication procedures are generally utilized to reinforcement information and minimize system and capacity overhead by recognizing and taking out excess among information. Rather than keeping various information duplicates with the same substance, de-duplication takes out repetitive information by keeping stand out physical duplicate and alluding other excess information to that duplicate. De-duplication has gotten much consideration from both the scholarly world and industry in light of the fact that it can significantly enhances stockpiling usage and spare storage room, particularly for the applications with high de-duplication proportion, for example, archival capacity frameworks. Various de-duplication frameworks have been proposed taking into account different de-duplication methodologies, for example, customer side or server-side de-duplications, record level or square level de-duplications. Particularly, with the approach of distributed storage, information de-duplication systems turn out to be more alluring and discriminating for the administration of always expanding volumes of information in distributed storage administrations which inspires endeavors and associations to outsource information stockpiling
    • …
    corecore