De-duplication with Authorization in Hybrid Cloud Approach for Security

Authors

  • Guljar P Shaikh Department of Information Technology, India

Keywords:

Data Security, Data Deduplication, Privilege authorization, Hybrid Cloud

Abstract

In cloud computing, most of the communication is done in consideration of file processing, and therefore it turn out to be very critical and important to deliver competent method for data security. The main focus in on data deduplication to provide security services over cloud for stored files. Data deduplication is data compression that is used to eliminate the matching copies of echoing data. This procedure is frequently used for reducing the storage space and save bandwidth over cloud. The term deduplication used for data security and privacy offers to the stored data files, Also encryption methods are applied to stored file information for more security purpose. In this paper we have studied the authorized data deduplication technique for providing security by using user’s differential privileges. Novel deduplication structures are offered for supporting authorized duplicate check. This paper shows how the security is achieved in hybrid cloud throughout the data deduplication process.

References

Guljar P. Shaikh,S. D. Chaudhary, PriyankaPaygude and Debnath Bhattacharyya, “Achieving Secure Deduplication by Using Private Cloud and Public Cloud”, In International Journal of Security and Its Applications Vol. 10, No. 5, 2016, pp.17-26.

Jin Li,yan kit li,xiaofengchen,patrickP.C.lee and wenjinglou,“A Hybrid Cloud Approach for Secure Authorized Deduplication”, In IEEE Transactions on Parallel and Distributed Systems, April 7,2015,pp 1206 – 1216, DOI:10.1109/TPDS.2014.2318320.

MihirBellare, SriramKeelveedhi, and Thomas Ristenpart, “Dupless: Serveraided encryption for deduplicated storage”, In USENIX Security Symposium, Washington DC, August 14-16, 2013, pp 179-194.

MihirBellare, SriramKeelveedhi, and Thomas Ristenpart, “Message-locked encryption and secure deduplication”, in proceedings of EUROCRYPT, Athens Greece, March 3, 2013, pp 296–312.

ShaiHalevi, Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg, “Proofs of ownership in remote storage systems”. In Proceedings of the 18thACM Conference on Computer and Communications Security, Hangzhou, China, 2011,pp 491–500.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. “Twin clouds: An architecture for secure cloud computing”. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011

Jin Li, XiaofengChen,MingqiangLi,Jingwei Li and Patrick P. C. Lee, “Secure Deduplication with Efficient and Reliable Convergent Key Management”, In IEEE Transactions on Parallel and Distributed Systems, May 12, 2014.pp 1615 – 1625, DOI: 10.1109/TPDS.2013.284.

J. Yuan and S. Yu. “Secure and constant cost public cloud storage auditing with deduplication”. IACR Cryptology ePrint Archive, 2013:149, 2013.

M. Bellare, C. Namprempre, and G. Neven, “Security proofs foridentity-based identification and signature schemes,” J. Cryptol.,vol. 22, no. 1, pp. 1–61, 2009.

P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. 24th International Conference Large Installation System Admin., 2010, pp. 29–40.

W. K. Ng, Y. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” in Proc. 27th Annual ACM Symp. Appl. Computer, 2012, pp. 441–446.

Qinlu He, Zhanhuai Li, Xiao Zhang, “Data Deduplication Techniques”, in International Conference on Future Information Technology and Management Engineering, China, 2010, pp.43-433.

D. Meister and A. Brinkmann, “Multi-Level Comparison of Data Deduplication in a Backup Scenario”, SYSTOR '09 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, ISBN: 978-1-60558-623-6, Article No. 8, ACM New York, NY, USA ©2009.

Downloads

Published

2025-11-11

How to Cite

[1]
S. Guljar P, “De-duplication with Authorization in Hybrid Cloud Approach for Security”, Int. J. Comp. Sci. Eng., vol. 4, no. 4, pp. 1–4, Nov. 2025.