International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 321

Research Paper | Information Technology | India | Volume 4 Issue 7, July 2015 | Popularity: 6.7 / 10


     

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte


Abstract: Data deduplication is the technique which is used for avoiding or removing the duplication of the data, and it is frequently used in cloud storage to reduce the storage space of the data and the bandwidth. To perform the secure deduplication in the cloud its a challenge. For provide the data security over the cloud convergent encryption technique is widely adopted. Convergent encryption technique is useful for efficiently and reliably manage the large number of convergent keys. The primary challenge is to correctly address the problem of achieving efficient and reliable key management in secure deduplication. Secondary data resource raises security and privacy concerns. Trusted third-party cloud service providers in the proposed system provide the confidentiality of data, reliability checking and also the access control mechanisms by number of internal and external attacks. As Deduplication improves the storage space, bandwidth efficiency but it is conflicting with the convergent encryption technique. The convergent encryption technique requires the different users to encrypt their data with their data with their respective key. As the same data copies of different user will confirm the method to individual cipher texts and making deduplication checking of data unfeasible. Convergent encryption provides an adequate option to implement data confidentiality while realizing deduplication. Convergent encryption is the technique which encrypts and decrypts the data copy with convergent key and which is calculated by cryptographic hash value of the content of the data copy itself. In key generation and data encryption technique users holds the key and send the cipher text to the cloud service provider. Encryption is the technique which deterministic and the identical data copies will create the similar convergent key and the same cipher text.


Keywords: Deduplication


Edition: Volume 4 Issue 7, July 2015


Pages: 2400 - 2403



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Nidhi Panpaliya, Prachi Sorte, "Secure Deduplication in Cloud Backup Services", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 2400-2403, https://www.ijsr.net/getabstract.php?paperid=SUB157079, DOI: https://www.doi.org/10.21275/SUB157079



Similar Articles

Downloads: 357 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 619 - 622

Property Future Price Estimation Using ML, Power BI Time Series Analysis and Forecasting

Aravinthan B.

Share this Article

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 1313 - 1318

Automation in Daily Life & It's Impact on Individuals & Society

Hemant Gautam Bodhare

Share this Article
Top