Improving Security on Cloud Based Deduplication System
Author : B. Rasina Begum and P. ChithraVolume 7 No.1 Special Issue:November 2018 pp 16-19
Abstract
Cloud computing provides a scalable platform for large amount of data and processes that work on various applications and services by means of on-demand service. The storage services offered by clouds have become a new profit growth by providing a comparable cheaper, scalable, location-independent platform for managing users’ data. The client uses the cloud storage and enjoys the high end applications and services from a shared group of configurable computing resources using cloud services. It reduces the difficulty of local data storage and maintenance. But it gives severe security issues toward users’ outsourced data. Data Redundancy promotes the data reliability in Cloud Storage. At the same time, it increases storage space, Bandwidth and Security threats due to some server vulnerability. Data Deduplication helps to improve storage utilization. Backup is also less which means less Hardware and Backup media. But it has lots of security issues. Data reliability is a very risky issue in a Deduplication storage system because there is single copy for each file stored in the server which is shared by all the data owners. If such a shared file/chunk was missing, large amount of data becomes unreachable. The main aim of this work is to implement Deduplication System without sacrificing Security in cloud storage. It combines both Deduplication and convergent key cryptography with reduced overhead.
Keywords
Convergent Key Cryptography, Proof of Ownership, Deduplication, Cloud Security
References
[1] Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang, Mohammad Mehedi Hassan and Abdul hameed Alelaiwi, “Secure Distributed Deduplication Systems with Improved Reliability”, IEEE Transactions on Computers, Vol. 64, pp. 3569-3579, December 2015
[2] Tin-Yu Wu, Jeng-Shyang Pan, and Chia-Fan Lin, “Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes”, IEEE Systems Journal, Vol.8, pp. 2018-218, March 2014
[3] Jin Li, Xiaofeng Chen, FatosXhafa, and Leonard Barolli, “Secure Deduplication Storage Systems Supporting Keyword Search”, Journal of Computer and System Sciences, Vol. 81, pp. 1532-1541.
[4] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing Lou, “Secure Deduplication with Efficient and Reliable Convergent Key Management”, IEEE Transactions On Parallel And Distributed Systems, Vol. 25, pp.1615-1625, June 2014
[5] Deepu S Bhaskar, B. Shylaja, “Performance Comparison of Deduplication Techniques For Storage In Cloud Computing Environment”, Asian Journal of Computer Science And Information Technology, Vol.4, pp. 42-46, 2014
[6] A.N. Naveen, and V. Ravi, “Client Side Deduplication Scheme for Secured Data Storage in Cloud Environments”, International Journal of Engineering Research & Technology, Vol.4, May 2015.
[7] Rongmao Chen, Yi Mu, and FuchunGuo, “BL-MLE:Block-Level Message-Locked Encryption for Secure Large File Deduplication”, IEEE Transactions on Information Forensics and Security,Vol. 10, pp. 2643-2652, August 2015.