Corpus ID: 42064651

Improve Reliability using Secure Distributed Deduplication System in Cloud

@inproceedings{Shaik2016ImproveRU,
  title={Improve Reliability using Secure Distributed Deduplication System in Cloud},
  author={Salma Shaik and G. Minni and Sayeed Yasin},
  year={2016}
}
31 Abstract— Data duplication is used to improve storage utilization and also be applied to network data transfers to reduce the number of bytes that must be sent. Keepi ng multiple data copies with the similar content, de-duplication eliminates redundant data by keeping only one physical copy an d refer other redundant data to that copy. Data de-duplicat ion occurs file level as well as block level. The duplicate cop ies of identical file eliminate by file level de-duplication. For the block… Expand

Figures from this paper

References

SHOWING 1-10 OF 14 REFERENCES
A Hybrid Cloud Approach for Secure Authorized Deduplication
TLDR
This paper makes the first attempt to formally address the problem of authorized data deduplication, and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations. Expand
Secure data deduplication
TLDR
This work has developed a solution that provides both data security and space efficiency in single-server storage and distributed storage systems. Expand
DupLESS: Server-Aided Encryption for Deduplicated Storage
TLDR
It is shown that encryption for deduplicated storage can achieve performance and space savings close to that of using the storage service with plaintext data. Expand
Secure Deduplication with Efficient and Reliable Convergent Key Management
TLDR
This paper proposes Dekey, a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers and demonstrates that Dekey incurs limited overhead in realistic environments. Expand
Proofs of ownership in remote storage systems
TLDR
This work identifies attacks that exploit client-side deduplication, allowing an attacker to gain access to arbitrary-size files of other users based on a very small hash signatures of these files, and introduces the notion of proofs-of-ownership (PoWs), which lets a client efficiently prove to a server that that the client holds a file, rather than just some short information about it. Expand
Fast and Secure Laptop Backups with Encrypted De-duplication
TLDR
This paper describes an algorithm which takes advantage of the data which is common between users to increase the speed of backups, and reduce the storage requirements, and describes a prototype implementation of this algorithm for Apple OS X. Expand
Reclaiming space from duplicate files in a serverless distributed file system
TLDR
This work presents a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication, and includes convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys. Expand
Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications
  • J. Plank, Lihao Xu
  • Computer Science
  • Fifth IEEE International Symposium on Network Computing and Applications (NCA'06)
  • 2006
TLDR
This paper presents an improvement to Cauchy Reed-Solomon coding that is based on optimizing theCauchy distribution matrix, and details an algorithm for generating good matrices and evaluates the performance of encoding using all implementations Reed- Solomon codes, plus the best MDS codes from the literature. Expand
How to share a secret
TLDR
This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces. Expand
Multiple ramp schemes
TLDR
In this correspondence, a tight lower bound is proved on the size of the shares held by each participant and on the dealer's randomness in multiple ramp schemes. Expand
...
1
2
...