Secure and duplication detection in cloud using cryptographic hashing method

  • Authors

    • J. K. Periasamy
    • B. Latha
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.9585
  • Data Chunks, Data De-Duplication, Duplication Detection, Hashing, Secure Cloud.
  • De-duplication systems are adopting De-duplication strategies such as client side or server side De-duplication.Particularly, in the beginning of cloud storage, data De-duplication techniques happen to add importance to store original volumes of data in the cloud. This technique motivates the enterprise and organization to farm out data storage to cloud service providers, as proof of several case studies was done.Block level de-duplication is used to discover, removes redundancies compare with previously stored information. The file will be separated into smaller segment as given by the system size or uneven size blocks or chunks whatever we need. Using predetermined size of blocks, the system can simplify the computations of block limits, although using uneven size blocks provides improved de-duplication. Secure Cloud introduce a new concept to audit entities with continuation of a Map Reduce cloud, which is used to help the client is easy to make data tags before feeding the data and audit with theprobity of data is analysed and stored in the cloud. the subject of previously finished work is fixed so that the computational load at user or auditor has huge amount of tag making. In accumulation, Secure Cloud also enables secure de-duplication. Perceive that the “validity†measured in Secure Cloud is the deterrence of leakage, the side channel information. In order to check the leakage of such side channel data, the work accept the custom and design a proof of rights protocol amid cloud servers and clients, which permit clients to confirm the cloud servers what they exactly own the object information.

  • References

    1. [1] Jiawei Yuan, Shucheng Yu, “Secure and Constant Cost Public Cloud Storage Auditing with De duplicationâ€, in IEEE Conference, Volume 25, Issue 1, Pp: 123-132, October 2013.

      [2] Shai Halevi , Danny Harnik , Benny Pinkas and Alexandra Shulman-Peleg,“Proofs of Ownership in Remote Storage Systemsâ€, in IEEE conference, August 2011.

      [3] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner,Zachary Peterson andDawn Song, “Provable Data Possession at Untrusted Storesâ€, in IEEE Transactions,Pp.598-604,November 2007.

      [4] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner,Zachary Peterson andDawn Song, “Provable Data Checking Using Provable Data Possessionâ€, in ACM Transaction on Information and System Security, Section 14, Article 12, May 2011.

      [5] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing Lou, "Secure De duplication with Efficient and Reliable Convergent Key Management", in IEEE transactions,Pp.370-375, June 2014.

      [6] Giuseppe Ateniese, Osama Khan, Reza Curtmola Zachary Peterson, Joseph Herring, Randal Burns "Remote Data Checking Using Provable Data Possession", in IEEE Transactions, Volume 14, Pp.1-34, May 2011.

      [7] Jiawei Yuan and Shucheng Yu, "Secure and Constant Cost Public Cloud Storage Auditing with De duplication", in IEEE conference, October 2013.

      [8] Jun Ren, Zhigiang Yao, JinboXiong, Yuanyuan Zhang, Ayong Ye, “A Secure Data Deduplication Scheme Based on Differential Privacyâ€, in IEEE international conference on Parallel and Distributed Systems, Dec 2016.

      [9] Zheng Yan, Mingiun Wang, Yuxiang Li, Athanasios V. Vasilakos, “Encrypted Dataanagement with Deduplication in Cloud Computingâ€, in IEEE Cloud computing, Volume 3, Issue 2,Pp.35-41, May 2016.

      [10] J. Gantz and D. Reinsel, “The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the Far Eastâ€, in emc.com, Dec.2012.

      [11] K. Periasamy and B. Latha, “The Enhancement of Storage and Bandwidth Optimization Using DataDe-Duplication, in International Journal of Applied Engineering Research Volume 9, Number 20, 2014.

  • Downloads

  • How to Cite

    Periasamy, J. K., & Latha, B. (2018). Secure and duplication detection in cloud using cryptographic hashing method. International Journal of Engineering & Technology, 7(1.7), 105-108. https://doi.org/10.14419/ijet.v7i1.7.9585