A Survey on Secure and Authorized Data Deduplication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 359

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.2 / 10


     

A Survey on Secure and Authorized Data Deduplication

Shweta Pochhi, Vanita Babanne


Abstract: Data deduplication looks for redundancy of sequences of bytes across very large comparison windows. Sequences of data (over 8 KB long) are compared to the history of other such sequences and it is ideal for highly redundant operations like backup which requires repeatedly copying and storing the same data set multiple times for recovery purpose. To protect the confidentiality of sensitive data while supporting deduplication, convergent encryption technique has been designed to encrypt the data. Convergent encryption enables duplicate files to coalesced into the space of a single file, even the files are encrypted with different users keys. To overcome attacks, the notion of proofs-of-ownership (PoWs) has been introduced, which lets a client proficiently prove to a server that the client holds a file.


Keywords: deduplication, Convergent Encryption, Proof of ownership, Authorized Duplicate Check, Differential Authorization


Edition: Volume 3 Issue 11, November 2014


Pages: 1696 - 1698



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Shweta Pochhi, Vanita Babanne, "A Survey on Secure and Authorized Data Deduplication", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 1696-1698, https://www.ijsr.net/getabstract.php?paperid=OCT141244, DOI: https://www.doi.org/10.21275/OCT141244

Top