International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 307 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | India | Volume 4 Issue 5, May 2015 | Popularity: 6.5 / 10


     

A Secure Approach for Deduplication using Hybrid Cloud

Yusuf Aliyu Adamu


Abstract: Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the condentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this study makes the rst attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself, also several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the denition specied in the proposed security model and shows that the proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.


Keywords: convergent encryption, deduplication, key generation, storage service provider, proof of ownership


Edition: Volume 4 Issue 5, May 2015


Pages: 1777 - 1781



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Yusuf Aliyu Adamu, "A Secure Approach for Deduplication using Hybrid Cloud", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 1777-1781, https://www.ijsr.net/getabstract.php?paperid=SUB154582, DOI: https://www.doi.org/10.21275/SUB154582



Similar Articles

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 8, August 2016

Pages: 1103 - 1107

Up in the Air: Cloud Computing Security and RSA Algorithm

Pooja Bharadwaj, Shivani Mankotia

Share this Article

Downloads: 108

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Downloads: 114

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

Share this Article

Downloads: 131

Research Paper, Information Technology, Malaysia, Volume 2 Issue 9, September 2013

Pages: 321 - 326

Proposing an Encryption Algorithm based on DES

Omar Zughoul, Hajar Mat Jani

Share this Article
Top