Secured Online Control Frame work for multi cloud Storage System using Authorized Deduplication Method

IJCSEC Front Page
Abstract:
Data deduplication is the specialized and resent compression technology in the cloud computing. In hybrid cloud server storing of repeated data courses many storage management challenges. The data deduplication overcome this challenges by reduce the copy of data and save the space in the cloud service provider (CSP). It also saves the bandwidth of the storage cloud. This deduplication method provides the confidentiality to protect the owner data which has been stored in the cloud service by using the various encryption techniques. In this paper we propose new convergent encryption technique and authentication process to store and retrieval the data in cloud services. It is first official attempt to address the issue of secure authorized data/content deduplication. Data/content and the differential privileges of clients are considered while data duplicate check thus differing from traditional deduplication approaches. Our work is to propose new data/content deduplication construction supporting system which authorizes data duplicate check in public multi cloud architecture. However security analysis shows that proposed system is secure in terms of definitions specified in the proposed security model. Model of proposed authorized data duplicate check is implemented and executed using this prototype. The result outcome shows that proposed authorized data duplicate check scheme incurs minimal overhead in public multi cloud architecture as compared to normal/earlier operations.

Keywords:Deduplication, Hybrid cloud, cloud service provider, Authorized dat duplicate check.

References:

  1. Chuanyi LIU, Dapeng JU, Yu GU, Youhui ZHANG, Dongsheng WANG, David H.C. Du2.Semantic Data De-duplication for Archival Storage System. In IEEE Transactions, August 2008.
  2. Neal Leavitt, Hybrid Clouds Move to the Fore front. Published by the IEEE Computer Society, May 2013.
  3. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, “A secure data deduplication scheme for cloud storage,” Tech. Rep. IBM Research, Zurich, ZUR 1308-022, 2013.
  4. S. Bugiel, S. Nurnberger, A. Sadeghi, and T Schneider Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011
  5. J. Li,X. Chen, M. Li, J. Li, P. Lee, and W. Lou. Secure Stand. deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems,Volume 25,Issue 6,2013.
  6. Rongmao Chen, Yi Mu. BL-MLE: Block-Level Message- Locked Encryption for Secure Large File Deduplication. IEEE Transactions on Information Forensics and Security, August 2015.
  7. M. Bellare, S. Keelveedhi, and T. Ristenpart.Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
  8. P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.
  9. Pooja S Dodamani, Pradeep Nazareth. A Survey on Hybrid Cloud with De-Duplication, International Journal on Recent and Innovation Trends in Computing and Communication, vol. 2, Issue 12, December 2014.
  10. Survey on Secure Authorized De-duplication in Hybrid Cloud, International Journal on Recent and Innovationm Trends in Computing and Communication, Volume: 2 Issue: 11 3574 – 3577.
  11. Bhushan Choudhary, Amit Dravid A Study on Authorized Deduplication Techniques in Cloud Computing, (IJARCET) Volume 3, Issue 12, April 2014.
  12. Aparna Ajit Patil, Dhanashree Kulkarni. A Survey on:Secure Data Deduplication on Hybrid Cloud Storage Architecture,International Journal of Computer Applications Volume110–No. January2015.
  13. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P.C. Lee, and Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, IEEE, Volume: 26, 2015.
  14. libcurl, (1997). [Online]. Available: http://curl.haxx.se/libcurl/
  15. C. Ng and P. Lee, “Revdedup: A reverse deduplication storage system optimized for reads to latest backups,” in Proc. 4th Asia-Pacific Workshop Syst., http://doi.acm.org/10.1145/2500727. 2500731, Apr. 2013.