An Efficient Data Deduplication with Block Sorting Encoding Technique for Cloud Storage Environment

An Efficient Data Deduplication with Block Sorting Encoding Technique for Cloud Storage Environment

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-10
Year of Publication : 2022
Authors : N. Mageshkumar, L. Lakshmanan
DOI : 10.14445/22315381/IJETT-V70I10P224

How to Cite?

N. Mageshkumar, L. Lakshmanan, "An Efficient Data Deduplication with Block Sorting Encoding Technique for Cloud Storage Environment," International Journal of Engineering Trends and Technology, vol. 70, no. 10, pp. 256-261, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I10P224

Abstract
Due to the advances in cloud computing (CC) applications, Cloud storage providers continuously require new techniques for minimising redundant data and increasing space spacing. By saving an individual copy of replica data, cloud service providers (CSP) significantly minimize the saving and communication cost. But, the use of deduplication poses several security issues. This paper employs a new scheme of secure data deduplication using the Perfect Hashing (PH) and block sorting encoding (BSE) technique called PH-BSE. The presented PH-BSE technique assumes the popularity of the data blocks and controls the characteristics of PH for ensuring block-level deduplication and data confidentiality. Afterwards, a compression technique named the BSE technique was used to compress the data segments to handle the storage efficiency effectively. The BSE algorithm establishes the relation to other compression techniques and attempts to enhance the compression efficiency. It considers the documents in blocks, which may be as large as the entire file and reorders the document. A detailed experimental analysis takes place to verify the superior nature of the proposed methodology.

Keywords
Block sorting encoder, Cloud computing, Deduplication, Encryption, Perfect Hashing.

Reference
[1] Shuangquan Li, Tongbin Zhang, Chuandi Pan, Li Cai, “ Health Checkup Could Reveal Chronic Disorders With Support From Artificial Intelligence,” International Journal of Engineering Trends and Technology, vol. 67, no. 11, pp. 8-15.
[2] Dilmurod Nabiev, Khayit Turaev, "Study of Synthesis and Pigment Characteristics of the Composition of Copper Phthalocyanine With Terephthalic Acid," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 1-9, 2022.
[3] Mandagere, N., Zhou, P., Smith, M.A., Uttamchandani, S, “Demystifying Data Deduplication,” In: Middleware ’08, New York, NY, USA, ACM, pp. 12–17, 2008.
[4] Aronovich, L., Asher, R., Bachmat, E., Bitner, H., Hirsch, M., Klein, S.T, “The Design of a Similarity Based Deduplication System,” In: SYSTOR ’09. vol. 6, pp. 1–6:14, 2006.
[5] Shwetambari Borade, Dhananjay Kalbande, Kristen Pereira, Rushil Patel, Sudhanshu Kulkarni, "Deep Scattering Convolutional Network for Cosmetic Skin Classification," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 10-23, 2022.
[6] Harnik, D., Margalit, O., Naor, D., Sotnikov, D., Vernik, G, “Estimation of Deduplication Ratios in Large Data Sets,” In: IEEE MSST vol. 12, pp. 1 –11, 2012.
[7] Harnik, D., Pinkas, B., Shulman-Peleg, A, “Side Channels in Cloud Services: Deduplication In Cloud Storage. Security Privacy,” IEEE vol. 8, no. 6, pp. 40 –47, 2010.
[8] Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A, “Proofs of Ownership in Remote Storage Systems,” CCS '11: Proceedings of the 18th ACM Conference on Computer and Communications Security, New York, NY, USA, ACM , pp. 491–500, 2011.
[9] Di Pietro, R., Sorniotti, A, “Boosting Efficiency and Security in Proof of Ownership for Deduplication,” In: ASIACCS ’12, New York, NY, USA, ACM, pp. 81–82, 2012.
[10] Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M, “Reclaiming Space From Duplicate Files in a Serverless Distributed File System,” In: ICDCS ’02, Washington, DC, USA, IEEE Computer Society , pp. 617–632, 2002.
[11] Storer, M.W., Greenan, K., Long, D.D., Miller, E.L, “Secure Data Deduplication,” In: Storagess ’08, New York, NY, USA, ACM , pp. 1–10, 2008.
[12] Naveentha, Sangeetha Priyalakshmi , "An Efficient Data Deduplication Methodology in a Hybrid Cloud,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 7, no. 1, pp. 6-9, 2017. ISSN:2249-2615, Www.Ijpttjournal.Org, Published By Seventh Sense Research Group.
[13] Xu, J., Chang, E.C., Zhou, J, “Weak Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage,” ASIA CCS '13: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 195–206, 2013.
[14] Dr.I.Lakshmi, "A Review on Security in Mobile Cloud Computing," SSRG International Journal of Mobile Computing and Application, vol. 6, no. 2, pp. 4-11, 2019. Crossref, https://doi.org/10.14445/23939141/IJMCA-V6I2P102.
[15] Effros, M., Visweswariah, K., Kulkarni, S.R. and Verdú, S, “ Universal Lossless Source Coding with the Burrows Wheeler Transform,” IEEE Transactions on Information Theory, vol. 48, no. 5, pp.1061-1081, 2002.
[16] Sanjana M. Kavatagi, Dr. Rashmi Rachh, "Implementation of Searchable Encryption Using Key Aggregation for Group Data Sharing in Cloud," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 8, pp. 11-14, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I8P103.
[17] K.Srilakshmi, N.V.Ashokkumar, C.P.V.N.J Mohan Rao "An Empirical Model of Data Deduplication Technique Over Cloud", International Journal of Engineering Trends and Technology (IJETT), vol. 45, no. 9, pp. 461-466 , 2017. ISSN:2231-5381. www.ijettjournal.Org. Published By Seventh Sense Research Group
[18] Bellare, M., Keelveedhi, S., Ristenpart, T, “Message-Locked Encryption and Secure Deduplication,” In: Advances In Cryptology– EUROCRYPT 2013. Springer 296–312 , 2013.
[19] Miss. Jayashri Patil, Dr. Sunita Barve, Mrs. Mayura Kulkarni, "Improving Security and Storage Availability in Deduplication Storage System," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 5, pp. 10-13, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I5P103.
[20] Bellare, M., Keelveedhi, S., Ristenpart, T, “ Dupless: Server-Aided Encryption for Deduplicated Storage,” In: 22nd USENIX Conference on Security, pp. 179–194, 2013.
[21] Puzio, P., Molva, R., Önen, M. and Loureiro, S., “Perfectdedup: Secure Data Deduplication,” In Data Privacy Management, and Security Assurance , Springer, Cham, pp. 150-166, 2015.