Research Article

Secure Deduplication Techniques: A Study

by  Vruti Satish Radia, Dheeraj Kumar Singh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Issue 8
Published: March 2016
Authors: Vruti Satish Radia, Dheeraj Kumar Singh
10.5120/ijca2016908874
PDF

Vruti Satish Radia, Dheeraj Kumar Singh . Secure Deduplication Techniques: A Study. International Journal of Computer Applications. 137, 8 (March 2016), 41-43. DOI=10.5120/ijca2016908874

                        @article{ 10.5120/ijca2016908874,
                        author  = { Vruti Satish Radia,Dheeraj Kumar Singh },
                        title   = { Secure Deduplication Techniques: A Study },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 137 },
                        number  = { 8 },
                        pages   = { 41-43 },
                        doi     = { 10.5120/ijca2016908874 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Vruti Satish Radia
                        %A Dheeraj Kumar Singh
                        %T Secure Deduplication Techniques: A Study%T 
                        %J International Journal of Computer Applications
                        %V 137
                        %N 8
                        %P 41-43
                        %R 10.5120/ijca2016908874
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Currently usage of cloud storage is increasing and to overcome increasing data issue, Data deduplication techniques are used. Moreover the Cloud storage service is provided by third party cloud providers thus security of data is needed. Data Deduplication techniques cannot be applied directly with security mechanisms. Thus here in this paper we would be discussing data deduplication techniques along with securing techniques thus forming secure deduplication.

References
  • Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Hassan and AbdulhameedAlelaiwi, “Secure Distributed Deduplication Systems with Improved Reliability”, IEEE Transactions on Computers Volume: PP, Year – 2015
  • Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management”, IEEE Transactions on Parallel and Distributed Systems vol. 25(6), Year – 2014
  • Yukun Zhou, Dan Feng, Wen Xia, Min Fu, Fangting Huang, Yucheng Zhang, Chunguang Li, “SecDep: A User-Aware Efficient Fine-Grained Secure Deduplication Scheme with Multi-Level Key Management”, IEEE Mass Storage Systems and Technologies (MSST) 2015 31st Symposium, Year - 2013
  • M. Bellare, S. Keelveedhi, and T. Ristenpart, ‘‘Message-Locked Encryption and Secure Deduplication”, Springer 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques at Athens Greece Proceedings, Year – 2013
  • M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Server-aided encryption for deduplicated storage”, ACM SEC'13Proceedings of the 22nd USENIX conference on Security, Year - 2013
  • “The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things”, http://www.emc.com/leadership/digital-universe/2014iview/executive-summary.htm, April 2014, EMC Digital Universe with Research & Analysis by IDC.
  • S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems”, ACM Conference on Computer and Communications Security, Year – 2011
  • http://www.druva.com/blog/understanding -data-deduplication/
  • http://searchdatabackup.techtarget.com/tip/The-pros-and-cons-of-file-level-vs-block-level - data-deduplication-technology
  • http://www.cddatahouse.co.uk/solutions/dedupe-deduplication-of-data
  • Neha Kaurav ,“ An Investigation on Data De-duplication Methods And it’s Recent Advancements ”, Proc. of the Intl. Conf. on Advances In Engineering And Technology - ICAET, Year – 2014
  • Jyoti Malhotra, JagdishBakal, “A Survey and Comparative Study of Data Deduplication Techniques” Pervasive Computing (ICPC) 2015 International Conference IEEE, Year – 2015
  • NagapramodMandagere, Pin Zhou, Mark A Smith, Sandeep Uttamchandani, “Demystifying data de-duplication”, Proceedings of the ACM/IFIP/USENIX Middleware '08, Year – 2008
  • IderLkhagvasuren, Jung Min So, Jeong Gun Lee, ChukYoo, Young WoongKo,”Byte-index Chunking algorithm for data deduplication system”, International Journal of Security and its Applications, Year -2013
  • Cai Bo, Zhang Feng Li, Wang Can, “Research on Chunking Algorithms of Data De-duplication”, Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering Springer, Year – 2012
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Data Deduplication Cloud Storage Data Security

Powered by PhDFocusTM