Downloads: 116 | Views: 281
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.3 / 10
Authorized Secure Deduplication in Cloud Computing
R. V. Argiddi, Prachi Sontakke
Abstract: A service model where data is provided to many users over the world, is called as Cloud storage. Data in this model is stored in several logical pools. Cloud storage is a concept of storage beyond an interface where the storage is controlled and managed on demand. This technology gives benefits by many features like data backup and archival, no need of maintaining hardware resources, greater data accessibility, etc. Data deduplication is an important feature in cloud storage. Deduplication process recognizes and gets rid of the repeated data in the backup storage, indirectly improving the network bandwidth. Providing security along with the deduplication process is a challenging task. In this paper, we survey the Ontologies related to deduplication techniques to give future direction. The key aspects used for maintaining security in cloud is convergent encryption. To overcome certain drawbacks in this encryption technique, we will describing new techniques- cryptographic tuning and domain separation. Maintaining the authorized access for the users confidential data, the concept called Proof of Ownership is used for recognizing the respective user along with his access privilege.
Keywords: Secure deduplication, Convergent Encryption, Proof of Ownership, Identification Protocol
Edition: Volume 5 Issue 6, June 2016
Pages: 706 - 709
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Downloads: 110
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1806 - 1810A Hybrid Cloud Approach for Secure Authorized Deduplication
Jagadish, Dr.Suvarna Nandyal
Downloads: 111
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1395 - 1398Security Analysis and Deduplication Using Convergent Algorithm
Rajkumar N Pagadi, Dr. Shubhangi D C
Downloads: 111
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1491 - 1494DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management
Soofiya MS, Sreetha V Kumar
Downloads: 112
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1696 - 1698A Survey on Secure and Authorized Data Deduplication
Shweta Pochhi, Vanita Babanne