Loading...
Please wait, while we are loading the content...
Similar Documents
A Review of Secure Authorized Deduplication with Encrypted Data for Hybrid Cloud Storage
| Content Provider | CiteSeerX |
|---|---|
| Author | Raut, Bhavanashri Shivaji |
| Abstract | popular with the continuous and exponential Increase of the number of users and the size of data. Data deduplication becomes more and more a necessity for cloud storage providers. Data deduplication is one of the important data compression technique for eliminating duplicate copies of repeating data. It has been widely used in the cloud storage to reduce the amount of storage space and save bandwidth. The advantage of deduplication unfortunately come with high cost in terms of new security and privacy challenges.The proposed scheme in this paper not only the reduces the cloud storage capacity but also improves the speed of data deduplication. To protect confidentiality of sensitive data while supporting deduplication the convergent encryption technique has been proposed to encrypt the data before outsourcing.This paper makes the first attempt to address the problem of authorized data deduplication. Deduplication system is different from the traditional system,because the differential privileges of users are further considered in duplicate check besides the data itself. Security analysis demonstrate that our scheme is secure in terms of the definitions specified in the proposed security model. We show that our proposed system is authorized duplicate check scheme incurs minimal overhead,compared to normal operations and also show that encryption for deduplicated storage can achieve performance and space saving close to that using the storage service. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Hybrid Cloud Storage Secure Authorized Deduplication Data Deduplication Encrypted Data First Attempt Duplicate Check Cloud Storage Capacity Traditional System Cloud Storage Provider Duplicate Copy Minimal Overhead Storage Space Privacy Challenge Authorized Data Deduplication Deduplication System Normal Operation Duplicate Check Scheme Differential Privilege Exponential Increase Security Analysis Demonstrate Sensitive Data Convergent Encryption Technique Cloud Storage Proposed Scheme Security Model Storage Service New Security Important Data Compression Technique Deduplicated Storage High Cost |
| Content Type | Text |
| Resource Type | Article |