Secure Redundant Data Avoidance over Multi-Cloud Architecture
Kamarthi Rekha, G.Somasekhar, Dr S.Prem Kumar, ,
Affiliations (M.Tech), CSE, Assistant professor Department of Computer Science and EngineeringAssistant Professor, Department of Computer Science and EngineeringProfessor & HOD, Department of computer science and engineering,G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform
duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners
only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented
system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data
copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption
technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to
formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the
differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data
avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is
secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may
satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
Kamarthi Rekha,G.Somasekhar,Dr S.Prem Kumar."Secure Redundant Data Avoidance over Multi-Cloud Architecture". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 08,pp.470-474, AUGUST - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I803.pdf,
 P. Anderson and L. Zhang. “Fast and secure laptop backups with encrypted de-duplication”. In Proc. of USENIX LISA, 2010.
 M. Bellare, S. Keelveedhi, and T. Ristenpart. “Dupless: Server aided encryption for deduplicated storage”. In USENIX Security Symposium, 2013.
 Pasqualo Puzio, Refik Molva ,MelekOnen ,”CloudDedup: Secure Deduplication with Encrypted Data for Cloud Storage”, SecludIT and EURECOM,France.
 Iuon –Chang Lin, Po-ching Chien ,”Data Deduplication Scheme for Cloud Storage” International Journal of Computer and Control(IJ3C),Vol1,No.2(2012)
 Shai Halevi, Danny Harnik, Benny Pinkas,”Proof of Ownership in Remote Storage System”, IBM T.J.Watson Research Center, IBM Haifa Research Lab, Bar IIan University,2011.
 M. Shyamala Devi, V.Vimal Khanna,Naveen Balaji ”Enhanced Dynamic Whole File De-Duplication(DWFD) for Space Optimization in Private Cloud Storage Backup”,IACSIT, August,2014.
 Weak Leakage-Resilient Client –Side deduplication of Encrypted Data in Cloud Storage” Institute for Info Comm Research,Singapore,2013
 Tanupriya Chaudhari , Himanshu shrivastav, Vasudha Vashisht, ”A Secure Decentralized Cloud Computing Environment over Peer to Peer”,IJCSMC,April,2013
 Mihir Bellare, Sriram keelveedhi,Thomas Ristenart ,”DupLESS: Server Aided Encryption for Deduplicated storage” University of California, San Diego2013.
 Luna SA HSM. http://bit.ly/17CDPm1.
 Opendedup. http://opendedup.org/.
 Atul Adya, William J Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R Douceur, Jon Howell, Jacob R Lorch, Marvin Theimer, and Roger P Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. ACM SIGOPS Operating Systems Review, 36(SI):1–14, 2002.
 Mihir Bellare, Alexandra Boldyreva, and Adam ONeill. Deterministic and efficiently searchable encryption. In Advances in Cryptology-CRYPTO 2007, pages 535–552. Springer, 2007.
 Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. Dupless: Server-aided encryption for deduplicated storage. 2013.
 Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. Message-locked encryption and secure deduplication. In Advances in Cryptology–EUROCRYPT 2013, pages 296–312. Springer, 2013.
 Kevin D. Bowers, Ari Juels, and Alina Oprea. Hail: a highavailability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security, CCS ’09, pages 187–198, New York, NY, USA, 2009. ACM.
 Landon P Cox, Christopher D Murray, and Brian D Noble. Pastiche: Making backup cheap and easy. ACM SIGOPS Operating Systems Review, 36(SI):285–298, 2002.
 John R Douceur, Atul Adya, William J Bolosky, P Simon, and Marvin Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on, pages 617–624. IEEE, 2002.
 Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg. Side channels in cloud services: Deduplication in cloud storage. Security & Privacy, IEEE, 8(6):40–47, 2010.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.