Integrated Privacy Preserving Data Deduplication Method using Third Party Auditor over Cloud Storage

  • Authors

    • Dr. Antony Xavier Bronson.F
    • Dr. Rajagopalan.S
    • Dr. Ramamoorthy S
    https://doi.org/10.14419/ijet.v7i3.24.22785
  • Cloud Computing, Storage, Privacy, DeDuplication, TPA
  • Nowadays the deduplication process plays major role in the field of information technology by handling bigdata and cloud data at the cloud storage. This process occupies less storage because the redundant data are removed and only one copy of the data is kept with high level of trust with security. Traditional method of the handling cloud data is in only one provider, so the same data is available in the provider which causes excessive storage. Existing deduplication algorithms performs the elimination process but it suffers in the performance due to the factors like compression ratio, delay in the process. This problem is overcome by using integrated way of keeping the data with high availability with multi provider interactions through Third Party Auditor (TPA). These interactions are happens through agreement. The privacy level of the data is maintained properly with multi layered structure in order to prevent unauthorized disclosure. The proposed algorithm is compared with various algorithms by considering performance parameters. Analyzes of the deduplication algorithms are carried in efficient manner. The main objective of the proposed method is to integrate more than one cloud provider and maintains only one copy of the data at the cloud storage in highly reliable manner.

     

     

  • References

    1. [1] Dong Yuan, Yun Yang et al, “A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloudâ€, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013, Pp. 1234-1244.

      [2] Yu Hua,Hong Jiang, Yifeng Zhu, Dan Feng,"SANE: Semantic-Aware Namespace in Ultra-Large-Scale File Systems",IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 5, MAY 2014,Pp. 1328-1338.

      [3] Yan Zhang and Nirwan Ansari,"On Protocol-Independent Data Redundancy Elimination",IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014,Pp.455-472.

      [4] Tin-Yu Wu,Jeng-Shyang Pan and Chia-Fan Lin, "Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes",IEEE SYSTEMS JOURNAL, VOL. 8, NO. 1, MARCH 2014, Pp. 208-218.

      [5] Jianjiang Li, Jie Wu, and Zhanning Ma,"Frequency and Similarity-Aware Partitioning for Cloud Storage Based on Space-Time Utility Maximization Model",TSINGHUA SCIENCE AND TECHNOLOGY,ISSNll1007 0214ll02/10ll,Volume 20, Number 3, June 2015,pp233-245.

      [6] Wen Xia,Hong Jiang,Dan Feng and Lei Tian,"DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for DataReduction with Low Overheads",IEEE TRANSACTIONS ON COMPUTERS, VOL. 65, NO. 6, JUNE 2016,Pp.1692-1705.

      [7] Bo Mao,Hong Jiang,Suzhen Wu and Lei Tian,"Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud",IEEE TRANSACTIONS ON COMPUTERS, VOL. 65, NO. 6, JUNE 2016, Pp.1775-1788.

      [8] Xian Chen,Wenzhi Chen,Zhongyong Lu, Peng Long, Shuiqiao Yang, and ZonghuiWang, "A Duplication-Aware SSD-Based Cache Architecture for Primary Storage in Virtualization Environment", IEEE SYSTEMS JOURNAL, VOL. 11, NO. 4, DECEMBER 2017,Pp.2578-2589.

      [9] Mi Wen, Kaoru Ota, He Li,Jingsheng Lei, Chunhua Gu, and Zhou Su,"Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS",IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, VOL. 2, NO. 4, DECEMBER 2015,Pp.137-147.

      [10] Berk Gulmezoglu, Mehmet Sinan _Inci, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar,"Cross-VM Cache Attacks on AES", IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, VOL. 2, NO. 3, JULY-SEPTEMBER 2016, Pp.211-222.

      [11] K. Vijayakumar C. Arun, Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC, Cluster Computing DOI 10.1007/s10586-017-1176-x,Sept 2017

      [12] R.Joseph Manoj, M.D.Anto Praveena, K.Vijayakumar, “An ACO–ANN based feature selection algorithm for big dataâ€, Cluster Computing The Journal of Networks, Software Tools and Applications, ISSN: 1386-7857 (Print), 1573-7543 (Online) DOI: 10.1007/s10586-018-2550-z, 2018.

      [13] K. Vijayakumar, C.Arun, Automated risk identification using NLP in cloud based development environments Ambient Intell Human Computing, DOI 10.1007/s12652-017-0503-7, Springer May 2017.

  • Downloads

  • How to Cite

    Antony Xavier Bronson.F, D., Rajagopalan.S, D., & Ramamoorthy S, D. (2018). Integrated Privacy Preserving Data Deduplication Method using Third Party Auditor over Cloud Storage. International Journal of Engineering & Technology, 7(3.24), 422-426. https://doi.org/10.14419/ijet.v7i3.24.22785