A Survey of Various Authorization & Deduplications in Cloud

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 4, Issue 1, No 1, 2016.

Copyright: All Rights Reserved ©2016

Year of Publication: 2016

Author: Shweta Biswas,Prof.Amit Saxena,Dr.Manish Manoria

Reference:IJCS-109

View PDF Format

Abstract

As the rapid data expansion of data most current years, cloud computing has turn out to be one of the furthermost accepted area in IT industry with considers to cost, proficient use of computing possessions for example storage space and system bandwidth in the cloud computing communications. Data deduplication refers to a method that reduces the unnecessary data on the storage and transmitting on the network, and is think about to be one of the most-enabling storage technologies that presents well-organized resource exploitation in the cloud computing. On the additional hand, be appropriating data deduplication acquires protection vulnerabilities in the cloud storage method so that untrusted entities including a cloud server or unauthorized users may break data confidentiality, privacy and integrity on the outsourced data. It is difficult to resolve the difficulty of data defense and confidentiality regarding data de-duplication, but positively essential for presenting amature and established cloud storage service.

References

[1] Peter Mell and Timothy Grance. The NIST definition of cloud computing (draft). NIST special publication 800 (2011), 145. [2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “Above the clouds: A berkeley view of cloud computing,” Technical Report UCB/EECS-2009-28, Dept. EECS, UC Berkerely, 2009. [3] D. Russell, “Data deduplication will be even bigger in 2010,” Gartner, 2010. [4] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song. 2011. Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, 1 (2011), 1–34. [5] Bo Chen, Reza Curtmola, Giuseppe Ateniese, and Randal Burns. 2010. Remote data checking for network coding-based distributed storage systems, 2010. [6] Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou Jin Li, “A Hybrid Cloud Approach for Secure Authorized,” IEEE Transactions on Parallel and Distributed Systems, vol. pp, pp. 1-12, 2014. [7] D. Harnik, B. Pinkas, and A. Shulman-Peleg. S. Halevi, “Proofs of ownership in remote storage systems.” ACM Conference on Computer and Communications Security, pp. 491-500, 2011. [8] L. Marques and C. J. Costa, “Secure deduplication on mobile devices,” in Proc. Workshop on Open Source and Design of Communication (OSDOS’11), pp. 19-26, 2011. [9] D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: Deduplication in cloud storage,” IEEE Security and Privacy Magazine, vol. 8, pp. 40-47, 2010. [10] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011. [11] Meyer, D. T., and Bolosky, W. J. A study of practical deduplication. ACM Transactions on Storage (TOS), 2012. [12] M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, “Dark clouds on the horizon: using cloud storage as attack vector and online slack space,” in Proc. USENIX Security Symposium (SEC’11), 2011. [13] L. Jin, C. Xiaofeng, L. Mingqiang, L. Jingwei, L. Patrick, and L. Wenjing, “Secure deduplication with efficient and reliable convergent key management,” IEEE Transactions on Parallel and Distributed Systems, vol. PP, 2013. [14] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Server-aided encryption for deduplicated storage,” in Proc. USENIX Security Symposium (SEC’13), pp. 179-194, and 2013. [15] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” Advances in Cryptology – EUROCRYPT’13, LNCS 7881, pp. 296-312, 2013. [16] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou” A Hybrid Cloud Approach for Secure Authorized Deduplication” IEEE Transactions On Parallel And Distributed System VOL: PP NO:99 YEAR 2013. [17] N.O.AGRAWAL1, S.S.KULKARNI, “Secure Deduplication and Data Security with Efficient and Reliable CEKM” International Journal of Application or Innovation in Engineering & Management (IJAIEM), November 2014. [18] Bhushan Choudhary, Amit Dravid , “A Study on Authorized Deduplication Techniques in Cloud Computing” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 12, April 2014. [19] Wee Keong Ng, Yonggang Wen, Huafei Zhu, “Private Data De-duplication Protocols in Cloud Storage” ACM 978-1-4503-0857-1/12/03, 2011. [20] Jorge Blasco, Agustin Orfila, “A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters” June 18, 2014. [21] Sharma Bharat, Mandre B.R. “A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing” International Journal of Computer Applications (0975 – 8887) Volume 120 – No.16, June 2015 [22] John R. Douceur, Atul Adya, William J. Bolosky, Dan Simon, Marvin Theimer, “Reclaiming Space from Duplicate Files in a Serverless Distributed File System” July 2002.


Keywords

Cloud Storage, Data deduplication, Cloud Computing

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog