Secure Data deduplication Systems with Reliability
AUTHORS
Tata Ravi Kumar,100-100 Department of Computer Science and Engineering KL Univeristy, Vaddeswaram, Guntur
ABSTRACT
Data deduplication is additionally a technique for eliminating duplicate copies of knowledge, and has been wide employed in cloud storage to cut back space for storing and transfer metric. However, there's only 1 copy for every file hold on in cloud even though such a file is in hand by Associate in Nursing outsized vary of users. As a result, deduplication system improves storage utilization whereas reducing responsibility. moreover, the challenge of privacy for sensitive info to boot arises once they are outsourced by users to cloud. going to address the upper than security challenges, this paper makes the first commit to formalize the notion of distributed reliable deduplication system. we tend to tend to propose new distributed deduplication systems with higher responsibility throughout that the information chunks are distributed across multiple cloud servers. the security desires of data confidentiality[1] and tag consistency are achieved by introducing a settled secret sharing theme in distributed storage systems, instead of practice merging cryptography as in previous deduplication systems. Security analysis demonstrates that our deduplication systems are secure in terms of the definitions per the planned security model. As a signal of conception, we tend to implement the planned systems and demonstrate that the incurred overhead is extremely restricted in realistic environments.
KEYWORDS
duplicate, confidentiality, consistency, encoding.
REFERENCES
[1] J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system”, in Proceedings of ICDCS'02, pp. 617-624, (2002). (CrossRef)(Google Scholar)
[2] D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: deduplication in cloud storage”, IEEE Security & Privacy, Vol. 8, No. 6, pp.40-47, November-December, (2010).(CrossRef)(Google Scholar)
[3] U.Karthik,“A Dynamic Load Balancing Algorithm in Computational Grid Using Fair Scheduling”, IJCSI International Journal of Computer Science Issues, Vol. 8, No. 5, No 1, September (2011).
[4] K.Eshghi, and D.E.Darrell,“Long Extreme Binning: Scalable, Parallel Deduplication for Chunk-based File Backup, . IEEE Computer, 29:38–47, February, (2004)
[5] H.S. Gunawi, N. Agrawal, A.C. Arpaci-Dusseau, R.H. Arpaci-Dusseau, and J. Schindler,“Deconstructing commodity storage clusters”, In Proceedings of the 32nd Int’l Symposium on Computer Architecture, pp. 60-71, June (2005).(CrossRef)(Google Scholar)
[6] S. Hand, and T. Roscoe,“Mnemosyne: Peer-to-peer steganographic storage”, Lecture Notes in Computer Science, Vol. 2429, pp. 130-140, March (2002).(CrossRef)(Google Scholar)
[7] D. Hitz, J. Lau, and M. Malcom,“File system design for an NFS file server appliance”, In Proceedings of the Winter, (1994).(CrossRef)(Google Scholar)