Efficient Distributed Deduplication System with Higher Reliability Mechanisms in Cloud
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2015 by IJETT Journal|
|Year of Publication : 2015|
|Authors : P.Nivetha, K.Prabhakar, E. Thangadurai
|DOI : 10.14445/22315381/IJETT-V29P250|
P.Nivetha, K.Prabhakar, E. Thangadurai"Efficient Distributed Deduplication System with Higher Reliability Mechanisms in Cloud", International Journal of Engineering Trends and Technology (IJETT), V29(5),272-277 November 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Data deduplication is a methodology of reducing storage needs by eliminating redundant data. Only one unique instance of the data should be retained on storage media, such as disk or tape. Redundant data is replaced with a pointer to the data copy and it has been widely used in many cloud storage technique to reduce the amount of storage space and save bandwidth. To maintain the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt data while outsourcing. To better protect data security, this work makes an attempt to address the problem of authorized data deduplication. The several deduplication techniques are implemented in Hybrid Cloud architecture. It uses hashing technique to maintain the uniqueness of textual data and Transformation techniques to maintain the same in images.
 Amazon, ?Case Studies, https://aws.amazon.com/solutions/casestudies/#backup.
 J. Gantz and D. Reinsel, ?The digital universe in 2020: Bigdata, bigger digi tal shadows, and biggest growth in thefar east, http://www.emc.com/collateral/analyst-reports/idcthe-digitaluniverse- in-2020.pdf, Dec 2012.
 M. O. Rabin, ?Fingerprinting by random polynomials, Center for Research in Computing Technology, Harvard University, Tech.Rep. Tech. Report TR-CSE-03-01, 1981.
 J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer,?Reclaiming space fromduplicate files in a serverless distributed file system. in ICDCS, 2002, pp. 617–624.
 M. Bellare, S. Keelveedhi, and T. Ristenpart, ?Dupless: Serveraided encryption for deduplicated storage, in USENIX Security Symposium, 2013.
 ——, ?Message-locked encryption and secure deduplication, in EUROCRYPT, 2013, pp. 296–312.
 G. R. Blakley and C. Meadows, ?Security of ramp schemes, in Advances in Cryptology: Proceedings of CRYPTO ’84, ser. Lecture Notes in Computer Science, G. R. Blakley and D.Chaum, Eds.Springer-Verlag Berlin/Heidelberg, 1985, vol. 196, pp. 242– 268.
 A. D. Santis and B. Masucci, ?Multiple ramp schemes, IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1720– 1728,Jul. 1999.
 M. O. Rabin, ?Efficient dispersal of information for security, load balancing, and fault tolerance, Journal of the ACM, vol. 36, no. 2,pp. 335–348, Apr. 1989.
 A. Shamir, ?How to share a secret, Commun. ACM, vol. 22, no. 11,pp. 612–613, 1979.
 J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, ?Secure deduplication with efficient and reliable convergent key management, in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615–1625.
 S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, ?Proofs of ownership in remote storage systems. in ACM Conference on Computer and Communications Security, Y. Chen, G.Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500.
 J. S. Plank, S. Simmerman, and C. D. Schuman, ?Jerasure: A library in C/C++ facilitating erasure coding for storage applications- Version 1.2, University of Tennessee, Tech. Rep. CS-08-627,August 2008.
 J. S. Plank and L. Xu, ?Optimizing Cauchy Reed-solomon Codes for fault-tolerant network storage applications, in NCA-06: 5th IEEE International Symposium on Network Computing Applications, Cambridge, MA, July 2006.
 C. Liu, Y. Gu, L. Sun, B. Yan, and D. Wang, ?R-admad: High reliability provision for large-scale de-duplication archival storage systems, in Proceedings of the 23rd international conference on Supercomputing, pp. 370–379.
 M. Li, C. Qin, P. P. C. Lee, and J. Li, ?Convergent dispersal:Toward storage-efficient security in a cloud-of-clouds, in The 6th USENIX Workshop on Hot Topics in Storage and File Systems, 2014.
 P. Anderson and L. Zhang, ?Fast and secure laptop backups with encrypted de-duplication, in Proc. of USENIX LISA, 2010.  Z. Wilcox-O’Hearn and B. Warner, ?Tahoe: the leastauthority filesystem, in Proc. of ACM StorageSS, 2008.
 A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S.Lui, ?A secure cloud backup system with assured deletion and version control, in 3rd International Workshop on Security in Cloud Computing, 2011.
 M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, ?Secure data deduplication, in Proc. of StorageSS, 2008.
 J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, ?A secure data deduplication scheme for cloud storage, in Technical Report,2013.
 D. Harnik, B. Pinkas, and A. Shulman-Peleg, ?Side channels in cloud services: Deduplication in cloud storage. IEEE Security &Privacy, vol. 8, no. 6, pp. 40–47, 2010.
 R. D. Pietro and A. Sorniotti, ?Boosting efficiency and security in proof of ownership for deduplication. in ACM Symposium on Information, Computer and Communications Security, H. Y. Youm and Y. Won, Eds. ACM, 2012, pp. 81–82.
 J. Xu, E.-C. Chang, and J. Zhou, ?Weak leakage-resilient client-side deduplication of encrypted data in cloud storage, in ASIACCS, 2013, pp. 195–206.
 W. K. Ng, Y. Wen, and H. Zhu, ?Private data deduplication protocols in cloud storage. in Proceedings of the 27th Annual ACM Symposium on Applied Computing, S. Ossowski and P.Lecca, Eds.ACM, 2012, pp. 441–446.
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,?Provable data possession at untrusted stores, in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS ’07. New York, NY, USA: ACM, 2007,pp.598–609. [Online]. Available:http://doi.acm.org/10.1145/1315245.1315318, IEEE Transactions on Computers Volume: PP Year: 2015
 A. Juels and B. S. Kaliski, Jr., ?Pors: proofs of retrievability for large files, in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 584–597. [Online]. Available: http://doi.acm.org/10.1145/1315245.1315317
 H. Shacham and B. Waters, ?Compact proofs of retrievability, in ASIACRYPT, 2008, pp. 90–107.