International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 269

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.8 / 10


     

Secure Manipulation of Deduplicated Data for Cloud Storage

Renuka Devi S, Eldo P Elias


Abstract: Cloud storage enables to configure and use online storage devices as storage targets. The increasing demand of cloud storage requirement has led to the process of deduplication. The term data deduplication refers to the techniques that store single copy of redundant data, and provide links to that copy instead of storing other actual copies of this data. Deduplication enables to reduce cloud storage space usage and uses network bandwidth efficiently. Convergent encryption technique is used to implement deduplication in the cloud storage, but it introduces new security threats. There comes the need of secure deduplication. Security of the proposed system relies on a proxy server which applies additional encryption on the uploaded data, this protects the data against convergent encryption attacks. System also includes a deduplication manager which deals with block level deduplication. Any cloud storage provider can be easily integrated in the new architecture. The system is implemented with the help of JAVA programming language, SQL database and Amazon s3 cloud service and the results are analyzed.


Keywords: Deduplication, Cloud Storage, Convergent Encryption


Edition: Volume 4 Issue 12, December 2015


Pages: 1036 - 1040


DOI: https://www.doi.org/10.21275/NOV152076



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Renuka Devi S, Eldo P Elias, "Secure Manipulation of Deduplicated Data for Cloud Storage", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 1036-1040, https://www.ijsr.net/getabstract.php?paperid=NOV152076, DOI: https://www.doi.org/10.21275/NOV152076



Similar Articles

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article



Top