366 research outputs found

    A Dynamic Proxy Oriented Approach for Remote Data Integrity checking along with Secure Deduplication in Cloud

    Get PDF
    In Cloud computing users store data over remote servers instead of computer�s hard drive. This leads to several security problems since data is out of the control of the user. So, to protect against the security attacks and to preserve the data integrity in the cloud, Huaqun Wang et.al proposed proxy oriented remote data integrity checking (RDIC). However, this scheme only focuses on one-way validation i.e clients have to know whether their files are stored integrally in the cloud. But this scheme does not address the problem of duplication which is essential with increasing demand for cloud storage. And as users are untrusted from the perspective of the server, there is a need to prove the ownership of the files. The proposed work considers the requirement of mutual validation. In this paper we propose a new construction of Identity based RDIC along with secure deduplication. The proposed scheme avoids burden of complex key management and flexible as it support anyone to verify the contents of the data apart from the data owner and incurs less computation cost as token generation is done by the proxy instead of user

    A Review on Deduplication-Cost Efficient Method to Store Data Over Cloud Using Convergent Encryption

    Get PDF
    This paper represents that, many techniques are using for the elimination of duplicate copies of repeating data, out of those techniques, the most important data compression technique is data deduplication. Convergent technique has been used to encrypt data before outsourcing for privacy and security point of view. In the proposed system, we apply the technique of cryptographic tuning to make the encryption more secure and flexible. In previous systems, there was a limitation of convergent encryption. Data deduplication does not allow the storage of repetitive blocks. It also puts the pointer to the existing blocks so that the data owner have the freedom of selecting users, to have access to the published file. Access control is provided into the application. The integrity of data outsourced to the cloud is managed by the hash calculation of any content following the proof-of-ownership module. Proposed system calculates the hash value of the data content on both sides i.e.; destination as well as source side. Request hash for the cloud side to predict the tampering of data. The expected analysis shows the improvement in execution time and development cost

    Reliable method for Authorized Deduplication by Using Hybrid Cloud Environment

    Get PDF
    Information deduplication is one of vital data compression procedures for eliminating duplicate copies of repeating information and has been broadly utilized as a part of cloud storage to diminish the measure of storage room and spare transmission capacity .To ensure secrecy of delicate information while supporting deduplication, united encryption system has been proposed to scramble the information before out sourcing. For better assurance of information security , primary endeavor is to formally address the issue of approved information deduplication .Unique in relation to conventional deduplication frameworks ,the proposed security display bolsters differential benefits of clients in copy check other than information itself. A few new deduplication developments are displayed supporting approved copy check in a hybrid cloud environments. Security investigation shows that this plan is secure as far as definitions determined in proposed security demonstrate. As a proof of idea, the usage of a model of the proposed approved copy check conspire and additionally the lead testbed tests utilizing the model causes negligible overhead contrasted with ordinary operations
    • …
    corecore