Secure Authorized Deduplication Based on Hybrid Cloud Approach

Authors

  • J Suresh Department of Computer Science and Systems Engineering, Andhra University, India
  • S Jhansi Rani Department of Computer Science and Systems Engineering, Andhra University, India

Keywords:

Deduplication, authorized duplicate check, confidentiality, hybrid cloud

Abstract

Data de-duplication is a data compression technique which is used to eliminate the duplicates for the repeated data. It is been extensively used in the cloud storage to minimize the amount of storage size and save maximum bandwidth. The convergent technique is been suggested, to encrypt the data before outsourcing to protect the confidentiality for the sensitive data while using de-duplication. In order to provide better data security, a hybrid cloud is been proposed. A hybrid cloud is a combination of private cloud and public cloud bound together. Private cloud is a place where some critical activities can be performed like security, setting the privileges to the users, setting the token number etc. whereas the public cloud is a place where some noncritical activities are performed like outsourcing an encrypted file. This paper formally addresses authorization with data de-duplication; we present several new de-duplications supporting the authorized duplicate check in the hybrid cloud architecture. In this paper we attempt to address the authorized de-duplication check, combined with convergent encryption for providing the better security to the sensitive data using the hybrid cloud architecture.

References

Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart “Dupless: Server-Aided Encryption for Deduplicated Storage”, SEC'13 Proceedings of the 22nd USENIX conference on Security, ISBN: 978-1-931971-03-4, Pages 179-194, USENIX Association Berkeley, CA, USA ©2013.

Paul Anderson and Le Zhang, “Fast and secure laptop backups with encrypted de-duplication”, LISA'10 Proceedings of the 24th international conference on Large installation system administration, Article No. 1-8, USENIX Association Berkeley, CA, USA ©2010.

Shweta Pochhi and Vanita Babanne,”A Survey on Secure and Authorized Data Deduplication”, International Journal of Science and Research (IJSR),Volume 3 Issue 11, November 2014.

Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, P. Lee, and Wenjing Lou “Secure deduplication with efficient and reliable convergent key management”, IEEE Transactions on Parallel and Distributed Systems (TPDS), volume:25, Issue 6 2014.

Shai Halevi, Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg, “Proofs of ownership in remote storage systems”, CCS '11 Proceedings of the 18th ACM conference on Computer and communications security, ISBN: 978-1-4503-0948-6, Pages 491-500, ACM New York, NY, USA ©2011.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing”, In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

NIST’s Policy on Hash Functions, Available: http://csrc.nist.gov/groups/ST/hash/policy.html [Online]., Sept. 2012.

D. Meister and A. Brinkmann, “Multi-Level Comparison of Data Deduplication in a Backup Scenario”, SYSTOR '09 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, ISBN: 978-1-60558-623-6, Article No. 8, ACM New York, NY, USA ©2009.

J.S. Plank and L. Xu, “Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications”, in Proc. 5th IEEE Int’l Symp. NCA, Cambridge, MA, USA, July 2006, pp.173-180.

M.O. Rabin, “Fingerprinting by Random Polynomials”, Center for Research in Computing Technology, Harvard University, Cambridge, MA, USA, Tech. Rep. TR-CSE-03-01, 1981.

M.O. Rabin, “Efficient Dispersal of Information for Security, Load Balancing, Fault Tolerance”, J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.

A. Rahumed, H.C.H. Chen, Y. Tang, P.P.C. Lee, and J.C.S. Lui, “A secure Cloud Backup System with Assured Deletion and Version Control”, In Proc. 3rd Int’l Workshop Security Cloud Computing, pp. 160-167, 2011.

A.D. Santis and B. Masucci, “Multiple Ramp Schemes”, IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1720-1728, July 1999.

M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, “Secure Data Deduplication”, in Proc. StorageSS, pp. 1-10, 2008.

Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou “A Hybrid Cloud Approach for Secure Authorized De-duplication”, in vol: pp no-99, IEEE, 2014.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system”, In ICDCS, pages 617–624, 2002.

D. Ferraiolo and R. Kuhn, “Role-based access controls”, In 15th NIST-NCSC National Computer Security Conf., 1992.

V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Page No : 120-125, Volume-02 , Issue-11, E-ISSN: 2347-2693, Nov -2014.

Downloads

Published

2025-11-10

How to Cite

[1]
J. Suresh and S. Jhansi Rani, “Secure Authorized Deduplication Based on Hybrid Cloud Approach”, Int. J. Comp. Sci. Eng., vol. 3, no. 10, pp. 1–5, Nov. 2025.