High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Client Side Deduplication Scheme in Cloud Storage Environments with Security as a Primary Concern

Author(s):

Ganesh Thigari , NATIONAL INSTITUTE OF ENGINEERING , MYSURU; Dr.G Raghavendra Rao, NATIONAL INSTITUTE OF ENGINEERING, MYSURU

Keywords:

Cloud Storage, Data Security, Deduplication, Cryptography, Confidentiality, Proof of Ownership

Abstract

Late years have seen the pattern of utilizing cloud-based administrations for vast scale content stockpiling, preparing, and conveyance. Security and protection are among top attentiveness toward people in general cloud situations. Additionally the world moves to computerized stockpiling for archival purposes, there is an expanding interest for frameworks that can give secure information stockpiling in a savvy way. By distinguishing regular pieces of information both inside and in the middle of records and putting away them just once, deduplication can yield cost reserve funds by expanding the utility of a given measure of capacity. The term information deduplication alludes to systems that store just a solitary duplicate of excess information, and provide connections to that duplicate as opposed to putting away other actual duplicates of this information. We order information deduplication methodologies as indicated by the essential information units they handle. In this appreciation, there are two principle information deduplication techniques: File-level deduplication is a famous kind of administration in which just a solitary duplicate of every record is put away Two or more documents are viewed as indistinguishable on the off chance that they have the same hash esteem. Block-level deduplication sections records into squares and stores just a solitary duplicate of every piece. The sys-tem could either utilize settled estimated blocks7 or variable-sized pieces. The creativity of our proposition is twofold. To start with, it guarantees better secrecy towards unapproved clients. That is, each customer figures a per information key to encode the information that he means to store in the cloud. In that capacity, the information access is overseen by the information proprietor. Second, by coordinating access rights in metadata document, an approved client can decode an encoded record just with his private key.

Other Details

Paper ID: IJSRDV3I40210
Published in: Volume : 3, Issue : 4
Publication Date: 01/07/2015
Page(s): 340-343

Article Preview

Download Article