Corpus ID: 17763534

SECURE DATA DEDUPLICATION IN CLOUD STORAGE BY USING HYBRID CLOUD APPROACH

@inproceedings{KumarSECUREDD,
  title={SECURE DATA DEDUPLICATION IN CLOUD STORAGE BY USING HYBRID CLOUD APPROACH},
  author={M. A. Kumar and P. N. Reddy}
}
— Data deduplication could be a technique for reducing the number of space for storing a company needs to save its knowledge. In most organizations, the storage systems contain copies of many items of information. for instance, identical file is also saved in many totally different places by different users, additional files that are not identical should still embody abundant of identical data. Deduplication eliminates these further duplicates by saving only one original copy of the info and… Expand

References

SHOWING 1-9 OF 9 REFERENCES
Proofs of ownership in remote storage systems
TLDR
This work identifies attacks that exploit client-side deduplication, allowing an attacker to gain access to arbitrary-size files of other users based on a very small hash signatures of these files, and introduces the notion of proofs-of-ownership (PoWs), which lets a client efficiently prove to a server that that the client holds a file, rather than just some short information about it. Expand
Fast and Secure Laptop Backups with Encrypted De-duplication
TLDR
This paper describes an algorithm which takes advantage of the data which is common between users to increase the speed of backups, and reduce the storage requirements, and describes a prototype implementation of this algorithm for Apple OS X. Expand
Boosting efficiency and security in proof of ownership for deduplication
TLDR
A novel Proof of Ownership (POW) scheme is introduced that has all features of the state-of-the-art solution while incurring only a fraction of the overhead experienced by the competitor. Expand
Message-Locked Encryption and Secure Deduplication
TLDR
The work shows that MLE is a primitive of both practical and theoretical interest, and makes connections with deterministic encryption, hash functions secure on correlated inputs and the sample-then-extract paradigm to deliver schemes under different assumptions and for different classes of message sources. Expand
RevDedup: a reverse deduplication storage system optimized for reads to latest backups
TLDR
RevDedup is proposed, a deduplication system that optimizes reads to the latest backups of virtual machine (VM) images using reverse dedUplication, thereby shifting fragmentation to old data while keeping the layout of new data as sequential as possible. Expand
Twin Clouds: An Architecture for Secure Cloud Computing
TLDR
This paper proposes an architecture for secure outsourcing of data and arbitrary computations to an untrusted commodity cloud which split the computations such that the trusted cloud is mostly used for security-critical operations in the less time-critical setup phase, whereas queries to the outsourced data are processed in parallel by the fast commodity cloud on encrypted data. Expand
Sedic: privacy-aware data intensive computing on hybrid clouds
TLDR
A suite of new techniques that make such privacy-aware data-intensive computing possible, called Sedic, leverages the special features of MapReduce to automatically partition a computing job according to the security levels of the data it works on, and arrange the computation across a hybrid cloud. Expand
Reclaiming space from duplicate files in a serverless distributed file system
TLDR
This work presents a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication, and includes convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys. Expand
Role-Based Access Controls
TLDR
A type of non-discretionary access contro l - role-based access control (RBAC) that is more central to the secure processing needs ofnon-military systems than DAC is described. Expand