An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment

被引:0
|
作者
J. K. Periasamy
B. Latha
机构
[1] Anna University,Faculty of Information and Communication Engineering
[2] Sri Sairam Engineering College,Department of Computer Science and Engineering
来源
关键词
Enhanced secure content de-duplication identification and prevention (ESCDIP); Cloud storage; Data de-duplication; Privacy preserving; Data uploading time; Data downloading time;
D O I
暂无
中图分类号
学科分类号
摘要
In cloud computing, de-duplication plays an essential role in detecting the de-duplication of encoded data with minimal computation and cost. De-duplication cleans the cloud datacentre’s unwanted storage and helps to identify the right owner of the content in the cloud. Even if there is only one copy of each data file stored in the cloud, the cloud has huge quantity of cloud users who own such data file. The existing method discussed a convergent encryption technique to solve the de-duplication problem. It also developed a system which does not allow storing any duplicate data in the cloud. However, the method does not assure consistency, reliability and confidentiality in cloud. Similar or different cloud users could store duplicated file in the cloud server, where cloud storage utilises high volume of storage. To find a solution for the above problems, the paper introduces enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm to enhance the file-level and content-level de-duplication detection of encoded data with reliability in cloud environment. Every cloud user’s files contain an independent master key for encryption using ESCDIP technique and outsourcing them into the cloud. It reduces the overheads that are associated with the interactive duplication detection and query processes. The proposed method identifies the unique data chunking to store in the cloud. Based on experimental result, the ESCDIP method reduces 2.3 data uploading time in seconds, 2.31 data downloading time in seconds and 32.66% communication cost compared to existing approaches.
引用
下载
收藏
页码:485 / 494
页数:9
相关论文
共 50 条
  • [21] Application for data de-duplication algorithm based on mobile devices
    Xingchen, Ge
    Ning, Deng
    Jian, Yin
    Journal of Networks, 2013, 8 (11) : 2498 - 2505
  • [22] Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes
    Wu, Tin-Yu
    Pan, Jeng-Shyang
    Lin, Chia-Fan
    IEEE SYSTEMS JOURNAL, 2014, 8 (01): : 208 - 218
  • [23] A NOVEL APPROACH FOR SECURING DATA DE-DUPLICATION METHODOLOGY IN HYBRID CLOUD STORAGE
    Bhaskar, Kameswari
    Sathiyavathi, R.
    Jayashree, R.
    Gladence, L. Mary
    Anu, V. Maria
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [24] A Novel scheme for Authenticated secured De-duplication with Identity based encryption in Cloud
    Reshma, N. S.
    Gopal, Greeshma N.
    Sreeraag, G.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE (ICIS), 2016, : 228 - 232
  • [25] Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
    Li, Le
    Zheng, Dong
    Zhang, Haoyu
    Qin, Baodong
    IEEE ACCESS, 2023, 11 : 28688 - 28698
  • [26] Cloud Storage Performance Enhancement by Real-time Feedback Control and De-duplication
    Wu, Tin-Yu
    Lee, Wei-Tsong
    Lin, Chia Fan
    2012 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2012,
  • [27] Certain Reduction Rules useful for De-duplication Algorithm of Indian Demographic Data
    Kaushik, Vandana Dixit
    Bendale, Amit
    Nigam, Aditya
    Gupta, Phalguni
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 79 - +
  • [28] Secure data de-duplication based on threshold blind signature and bloom filter in internet of things
    Mi, Bo
    Li, Yang
    Darong, Huang
    Wei, Tiancheng
    Zou, Qianqian
    IEEE Access, 2020, 8 : 167113 - 167122
  • [29] Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things
    Mi, Bo
    Li, Yang
    Darong, Huang
    Wei, Tiancheng
    Zou, Qianqian
    IEEE ACCESS, 2020, 8 : 167113 - 167122
  • [30] An Effective Data Storage Model for Cloud Databases using Temporal Data De-duplication Approach
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 42 - 45