Downloads: 112 | Views: 279
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.2 / 10
A Survey on Secure and Authorized Data Deduplication
Shweta Pochhi, Vanita Babanne
Abstract: Data deduplication looks for redundancy of sequences of bytes across very large comparison windows. Sequences of data (over 8 KB long) are compared to the history of other such sequences and it is ideal for highly redundant operations like backup which requires repeatedly copying and storing the same data set multiple times for recovery purpose. To protect the confidentiality of sensitive data while supporting deduplication, convergent encryption technique has been designed to encrypt the data. Convergent encryption enables duplicate files to coalesced into the space of a single file, even the files are encrypted with different users keys. To overcome attacks, the notion of proofs-of-ownership (PoWs) has been introduced, which lets a client proficiently prove to a server that the client holds a file.
Keywords: deduplication, Convergent Encryption, Proof of ownership, Authorized Duplicate Check, Differential Authorization
Edition: Volume 3 Issue 11, November 2014
Pages: 1696 - 1698
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1685 - 1688An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1696 - 1700Data Security Policies in Cloud: A Survey
Kasundra Punitkumar R., Shikha J. Pachouly
Downloads: 107
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1613 - 1618Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
Nancy Digra, Sandeep Sharma
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1382 - 1385A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud
Snehal Barvkar, Vaishali Mali