15 research outputs found

    A Review on Deduplication-Cost Efficient Method to Store Data Over Cloud Using Convergent Encryption

    Get PDF
    This paper represents that, many techniques are using for the elimination of duplicate copies of repeating data, out of those techniques, the most important data compression technique is data deduplication. Convergent technique has been used to encrypt data before outsourcing for privacy and security point of view. In the proposed system, we apply the technique of cryptographic tuning to make the encryption more secure and flexible. In previous systems, there was a limitation of convergent encryption. Data deduplication does not allow the storage of repetitive blocks. It also puts the pointer to the existing blocks so that the data owner have the freedom of selecting users, to have access to the published file. Access control is provided into the application. The integrity of data outsourced to the cloud is managed by the hash calculation of any content following the proof-of-ownership module. Proposed system calculates the hash value of the data content on both sides i.e.; destination as well as source side. Request hash for the cloud side to predict the tampering of data. The expected analysis shows the improvement in execution time and development cost

    Survey on Secure Authorized De-duplication in Hybrid

    Get PDF
    Nowadays, cloud computing provides high amount of storage space and massive parallel computing at effective cost. As cloud computing becomes prevalent, excessive amount of data being stored in the cloud. However, exponential growth of ever-increasing volume of data has raised many new challenges. De-duplication technique is specialized data compression technique which eliminates redundant data as well as improves storage and bandwidth utilization. Convergent encryption technique is proposed to enforce confidentiality during de-duplication, which encrypt data before outsourcing. To better protect data security, we present different privileges of user to address problem of authorized data de-duplication. We also present several new de-duplication constructions supporting authorized duplicate check in hybrid cloud architecture, which incurs minimal overhead compared to normal operation

    Secure Data Deduplication on Hybrid Cloud Storage Architecture

    Get PDF
    Data deduplication is one of the most important Data compression techniques used for to removing the identical copies of repeating data and it is used in the cloud storage for the purpose of reduce the storage space as well as save bandwidth. To retain the confidentiality of sensitive data while supporting the deduplication, to encrypt the data before outsourcing convergent encryption technique has been proposed . This project makes the first attempt to formally address the problem of authorized data deduplication giving better protect data security, Different from the traditional deduplication system, distinctive benefits of the user are further considered the duplicate check besides the data itself. Hybrid cloud architecture having various new deduplication constructions supporting authorized duplicate check. The proposed security models contain the illustration of security analysis scheme. As a proof of concept, contains the implementation framework of proposed authorized duplicate check scheme and conduct experiments using these prototype. In proposed system contain authorized duplicate check scheme sustain minimal overhead compared to normal operations. DOI: 10.17762/ijritcc2321-8169.15059

    PRIVACY AUDITING AND DEDUPLICATING DATA WITH SECCLOUD IN CLOUD COMPUTING

    Get PDF
    As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing entity with a maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is designed motivated by the fact that customers always want to encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data

    Ranked Keyword Search and Secure Data Sharing In Cloud Environment

    Get PDF
    The cloud computing innovation appeared amid the21st century; outsourcing data to cloud benefit for capacity turns into a helpful yet proficient pattern, which benefits in saving endeavors on data support and administration. In this work, we concentrate the issue of secure de-duplication on cloud data, likewise guaranteeing integrity. In particular, going for accomplishing both data integrity and de-duplication in cloud, we propose a framework, specifically cloud. Cloud presents an auditing element with support of the cloud, which creates hash esteem before transferring and audit the integrity of data having been put away in cloud. Contrasted and past work, the calculation by client in D-Cloud is extraordinarily lessened amid the document transferring and auditing stages. Cloud is planned understanding the way that clients dependably need to encode their data being transferred, and empowers integrity auditing and secure de-duplication on scrambled data. The primary danger for this cloud data stockpiling is data security as far as keeps up data integrity and data deduplication on cloud. Taking care of both issue normal time is the troublesome assignment. SecCloud and SecCloud+ are two new cloud auditing frameworks which help in keeping up cloud data integrity with productive data deduplication, In SecCloud framework, client can ready to create data labels before putting away data on cloud which encourages amid performing audit to check integrity of data, opposite side SecCloud+ framework give encryption of data before transferring it, which empowers integrity check and secure deduplication of encoded data

    Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications

    Get PDF
    As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication. Data deduplication is a method to regulate the explosive growth of information within the cloud storage, most of the storage providers are finding more secure and efficient methods for their sensitive method. Recently, a noteworthy technique referred to as signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented with better performance According to deduplication, we introduce a method that can eliminate redundant encrypted data owned by different users. Furthermore, we generate a tag which will be the key component of big data management. We propose a technique called digital signature for ownership verification. Convergent encryption also called for a content hash key cryptosystem. Convergent encryption is an encryption approach that supports deduplication. With this encryption technique, the encryption key is generated out of a hash of plain text. Therefore applying this technique, identical plaintexts would turn out the same ciphertext

    Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications

    Get PDF
    As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication. Data deduplication is a method to regulate the explosive growth of information within the cloud storage, most of the storage providers are finding more secure and efficient methods for their sensitive method. Recently, a noteworthy technique referred to as signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented with better performance According to deduplication, we introduce a method that can eliminate redundant encrypted data owned by different users. Furthermore, we generate a tag which will be the key component of big data management. We propose a technique called digital signature for ownership verification. Convergent encryption also called for a content hash key cryptosystem. Convergent encryption is an encryption approach that supports deduplication. With this encryption technique, the encryption key is generated out of a hash of plain text. Therefore applying this technique, identical plaintexts would turn out the same ciphertext

    Enhanced Authorized Deduplication check and providing data confidentiality in Twin cloud

    Get PDF
    Cloud computing giving pooled assets as a support of diverse clients through web in different models. The primary administration of cloud is information stockpiling. Clients putting away the information in cloud by some helpful elements like sharing, benefits and get to rights. Be that as it may, the issue is expanded volumes of information devouring more storage room. Information deduplication is novel method which kills Duplicate information to give classification along deduplication check prior approved information deduplication and focalized encryption system is utilized. In any case, past deduplication frameworks can't bolster differential approval copy check. We present twin cloud mix of open and private cloud to bolster more grounded security by encoding the record with differential benefit keys. Along these lines, the clients without relating benefits can't perform the copy check. Besides, such unapproved clients can't decode the ciphertext even plot with the S-CSP. At long last our proposed model is secured and gives secrecy

    Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud

    Get PDF
    With the rapid development of cloud storage, more and more cloud clients can store and access their data anytime, from anywhere and using any device. Data deduplication may be considered an excellent choice to ensure data storage efficiency. Although cloud technology offers many advantages for storage service, it also introduces security challenges, especially with regards to data integrity, which is one of the most critical elements in any system. A data owner should thus enable data integrity auditing mechanisms. Much research has recently been undertaken to deal with these issues. In this paper, we propose a novel blockchain-based method, which can preserve cloud data integrity checking with data deduplication. In our method, a mediator performs data deduplication on the client side, which permits a reduction in the amount of outsourced data and a decrease in the computation time and the bandwidth used between the enterprise and the cloud service provider. This method supports private and public auditability. Our method also ensures the confidentiality of a client's data against auditors during the auditing process
    corecore