• Corpus ID: 53517489

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

@inproceedings{Digra2017ReviewOV,
  title={Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing},
  author={Nancy Digra and Sandeep Sharma},
  year={2017}
}
Data deduplication is the mechanism by which redundant data is eliminated from advanced computing architecture. Cost in advanced computing is due to storage use. Compression is the need of the hour to save bandwidth and storage space to reduce overhead. Security is also at stake since large number of users is using cloud. To enhance security, encryption mechanisms are utilized within deduplication process. Security techniques within deduplication are critical. Researchers are working towards… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 37 REFERENCES
A Hybrid Cloud Approach for Secure Authorized Deduplication
TLDR
This paper makes the first attempt to formally address the problem of authorized data deduplication, and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
A secure cloud storage system supporting privacy-preserving fuzzy deduplication
TLDR
The robustness evaluation is given and it is demonstrated that this fuzzy deduplication system is able to duplicate perceptual similar images, which optimizes the storage and bandwidth overhead greatly in cloud storage service.
ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
TLDR
ClouDedup is proposed, a secure and efficient storage service which assures block-level deduplication and data confidentiality at the same time and remains secure thanks to the definition of a component that implements an additional encryption operation and an access control mechanism.
A secure data deduplication framework for cloud environments
TLDR
This paper will show that the proposed framework will allow cloud service and storage providers to employ data deduplication techniques without giving them access to either the users' plaintexts or the users's decryption keys.
Hybrid data deduplication in cloud environment
TLDR
This manuscript proposes a hybrid data deduplication mechanism which provides a practical solution with partial semantic security and is likely to be adopted by many cloud service providers.
Public auditing for encrypted data with client-side deduplication in cloud storage
TLDR
A public auditing scheme for cloud storage systems, in which deduplication of encrypted data and data integrity checking can be achieved within the same framework, and is provably secure and efficient.
HEDup: Secure Deduplication with Homomorphic Encryption
TLDR
This paper proposes a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises, called HEDup (Homomorphic Encryption Deduplication).
Secure Deduplication with Efficient and Reliable Convergent Key Management
TLDR
This paper proposes Dekey, a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers and demonstrates that Dekey incurs limited overhead in realistic environments.
Data encryption and decryption algorithms using key rotations for data security in cloud system
TLDR
This work proposes an efficient data encryption to encrypt sensitive data before sending to the cloud server that exploits the block level data encryption using 256 bit symmetric key with rotation.
Deduplication Techniques: A Technical Survey
TLDR
Deduplication methods, several Deduplications techniques like Extreme Binning, MAD2, Multi-level DeduPLication where DeduPlication is performed in backup services, their comparison based on several factors.
...
1
2
3
4
...