Vol. 1, Issue 9, Part D (2015)
A Survey on Authorized Deduplication in cloud storage environment
A Survey on Authorized Deduplication in cloud storage environment
Author(s)
E Seetha, D Ponniselvi
Abstract
Cloud computing is the most important emerging computing in which resources are shared over the internet. However, cloud storage environment faces one serious problem such as management of large volume of data. To manage vast amount of data, a deduplication technique is used. Data deduplication is one of the important data compression techniques for eliminating duplicate copies of repeating data. To keep the confidentiality of sensitive data while supporting the deduplication, to encrypt the data before outsourcing convergent encryption technique has been proposed. To better protect data security, this project makes the first attempt to formally address the problem of authorized data deduplication.Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. In this paper data de-duplication process will be discussed in detail. In data de-duplication there are several methods available that makes it easy to implement. In this paper we will examine about all methods, processes that are used in data de-duplication. The proposed security models contain the demonstration of security analysis scheme. As a proof of concept, contains the implementation framework of proposed authorized duplicate check scheme and conduct test bed experiments using these prototype. In proposed system contain authorized duplicate check scheme incurs minimal overhead compared to normal operations.
How to cite this article:
E Seetha, D Ponniselvi. A Survey on Authorized Deduplication in cloud storage environment. Int J Appl Res 2015;1(9):201-203.