Secure Data Deduplication System with Tag Consistency in Cloud Data Storage

被引:1
|
作者
Patil, Pramod Gorakh [1 ]
Dixit, Aditya Rajesh [2 ]
Sharma, Aman [2 ]
Mahale, Prashant Rajendra [2 ]
Jadhav, Mayur Pundlik [2 ]
机构
[1] SITRC, Nasik, India
[2] SITRC, Dept Comp Engn, Nasik, India
关键词
Cloud; Deduplication; Network; Security;
D O I
10.1007/978-981-10-8681-6_13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing technique is most generally used technique nowadays, in that clouding up is completed over giant communication network. And provides massive space for storing in all sectors like administrative unit, private enterprises, etc. Additionally stores personal information on cloud, but the foremost necessary drawback in cloud is that giant quantity of space for storing is needed and conjointly duplicate copies of knowledge is store on cloud. There is a unit of several techniques that is employed for preventing duplicate copies of continuation information. The necessary technique is data deduplication, Data Deduplication is specializes data compression techniques for removing duplicate copies of repeated data and has been widely utilized in cloud storage to reduce the quantity of space for storing. To safeguard the confidentiality of sensitive data on cloud, the confluent encryption technique is utilized to cipher the data before storing it on cloud. In projected system we have used Shamir Secrete sharing algorithm.
引用
收藏
页码:119 / 124
页数:6
相关论文
共 50 条
  • [1] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543
  • [2] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [3] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [4] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    [J]. Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470
  • [5] Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
    Hur, Junbeom
    Koo, Dongyoung
    Shin, Youngjoo
    Kang, Kyungtae
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 3113 - 3125
  • [6] A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    [J]. ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [7] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    [J]. Cluster Computing, 2024, 27 : 2203 - 2215
  • [8] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [9] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [10] Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage
    Ma, Hua
    Tian, Guohua
    Liu, Zhenhua
    Zhang, Linchao
    [J]. FRONTIERS IN CYBER SECURITY, 2018, 879 : 168 - 176