2,004 research outputs found

    Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

    Get PDF
    Cloud storage systems are becoming increasingly popular and popular and the cloud computing is getting enhance day by day it needs to provide more security with secure auditing. For storing large and large amount of data in cloud, requires more space and data can be replicated which will increase the space and cost too unnecessarily. To avoid this deduplication needs to be done. So , in this paper, pondering the main issue of honesty and secure deduplication on cloud information. Specifically, going for achieving both information uprightness as well as deduplication in cloud. And in this paper, proposing the algorithm which will audit securely and provide block level deduplication as well as it will maintain reliability of data in clou

    A secure privacy preserving deduplication scheme for cloud computing

    Full text link
    © 2019 Elsevier B.V. Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs. Despite of the fact that the traditional deduplication approach has been adopted widely, it comes with a high risk of losing data confidentiality because of the data storage models in cloud computing. To deal with this issue in cloud storage, we first propose a TEE (trusted execution environment) based secure deduplication scheme. In our scheme, each cloud user is assigned a privilege set; the deduplication can be performed if and only if the cloud users have the correct privilege. Moreover, our scheme augments the convergent encryption with users’ privileges and relies on TEE to provide secure key management, which improves the ability of such cryptosystem to resist chosen plaintext attacks and chosen ciphertext attacks. A security analysis indicates that our scheme is secure enough to support data deduplication and to protect the confidentiality of sensitive data. Furthermore, we implement a prototype of our scheme and evaluate the performance of our prototype, experiments show that the overhead of our scheme is practical in realistic environments

    Block-level De-duplication with Encrypted Data

    Get PDF
    Deduplication is a storage saving technique which has been adopted by many cloud storage providers such as Dropbox. The simple principle of deduplication is that duplicate data uploaded by different users are stored only once. Unfortunately, deduplication is not compatible with encryption. As a scheme that allows deduplication of encrypted data segments, we propose ClouDedup, a secure and efficient storage service which guarantees blocklevel deduplication and data confidentiality at the same time. ClouDedup strengthens convergent encryption by employing a component that implements an additional encryption operation and an access control mechanism. We also propose to introduce an additional component which is in charge of providing a key management system for data blocks together with the actual deduplication operation. We show that the overhead introduced by these new components is minimal and does not impact the overall storage and computational costs

    Secure Authorized Deduplication for Hybrid Cloud Storage

    Get PDF
    Cloud computing provides number of applications, as utilities in the internet .This applications create, configure and customize accessing referring the cloud computing as online utility. Cloud computing offers online data storage, infrastructure, services over networks and applications. Cloud storage is an widely popular offering of cloud computing. Cloud storage is used for increasing the number of users, access the users data from anywhere and also space for data storage in computing. Data deduplication means a type of data compression. This data compression to reduce its storage requirement using encoding of data. Data deduplication method used for replacement of multiple copies of data or eliminating duplicate copies of data. It also reduce storage space and save bandwidth. Deduplication is having one of the advantage for new security and privacy challenges with high cost. Basically, data deduplication means of reducing storage space in cloud. In this paper certain improves the speed of data deduplication with encrypted data reduces the cloud storage capacity of data. This paper first to show that addressing the problem of secure authorized data deduplication. Data deduplication works by eliminating data and ensuring that only one unique instance of data. Hence,Data deduplication is also called as single instance storage, because of the differential privilege of users considered in duplicate check. In this paper we implement that deduplication with encrypted data using SHA and MD5 algorithm for hybrid cloud storage

    Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications

    Get PDF
    As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication. Data deduplication is a method to regulate the explosive growth of information within the cloud storage, most of the storage providers are finding more secure and efficient methods for their sensitive method. Recently, a noteworthy technique referred to as signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented with better performance According to deduplication, we introduce a method that can eliminate redundant encrypted data owned by different users. Furthermore, we generate a tag which will be the key component of big data management. We propose a technique called digital signature for ownership verification. Convergent encryption also called for a content hash key cryptosystem. Convergent encryption is an encryption approach that supports deduplication. With this encryption technique, the encryption key is generated out of a hash of plain text. Therefore applying this technique, identical plaintexts would turn out the same ciphertext
    • …
    corecore