Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services

Author(s):  
Hyungjune Shin ◽  
Dongyoung Koo ◽  
Youngjoo Shin ◽  
Junbeom Hur

Cloud Computing is well known today on account of enormous measure of data storage and quick access of information over the system. It gives an individual client boundless extra space, accessibility and openness of information whenever at anyplace. Cloud service provider can boost information storage by incorporating data deduplication into cloud storage, despite the fact that information deduplication removes excess information and reproduced information happens in cloud environment. This paper presents a literature survey alongside different deduplication procedures that have been based on cloud information storage. To all the more likely guarantee secure deduplication in cloud, this paper examines file level data deduplication and block level data deduplication.


Author(s):  
Adithya M. ◽  
Dr. Shanthini B.

Secure information deduplication can altogether decrease the correspondence and capacity overheads in distributed storage benefits and has potential applications in our large information-driven society. Existing information deduplication plans are commonly intended to either oppose savage power assaults or guarantee the effectiveness and information accessibility, yet not the two conditions. We are additionally not mindful of any current plan that accomplishes responsibility, in the feeling of lessening copy data divulgence (e.g., to decide if plain-writings of two scrambled messages are indistinguishable). Right now, examine the three-level cross-space design and propose an effective and protection safeguarding huge information deduplication in distributed storage (from now on alluded to as EPCDD). EPCDD accomplishes both protection safeguarding and information accessibility and opposes beast power assaults. Plus, we consider the responsibility to offer preferable protection affirmations over existing plans. We at that point show that EPCDD beats existing contending plans, as far as calculation, correspondence, and capacity overheads. Additionally, the time unpredictability of copy search in EPCDD is logarithmic.


Author(s):  
Shynu P. G. ◽  
Nadesh R. K. ◽  
Varun G. Menon ◽  
Venu P. ◽  
Mahdi Abbasi ◽  
...  

AbstractData redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are not appropriate because of the dynamic nature of data in the cloud or integrated cloud environments. This problem can be effectively reduced and successfully managed by data deduplication techniques, eliminating duplicate data in cloud storage systems. Implementation of data deduplication (DD) over encrypted data is always a significant challenge in an integrated cloud-fog storage and computing environment to optimize the storage efficiently in a highly secured manner. This paper develops a new method using Convergent and Modified Elliptic Curve Cryptography (MECC) algorithms over the cloud and fog environment to construct secure deduplication systems. The proposed method focuses on the two most important goals of such systems. On one side, the redundancy of data needs to be reduced to its minimum, and on the other hand, a robust encryption approach must be developed to ensure the security of the data. The proposed technique is well suited for operations such as uploading new files by a user to the fog or cloud storage. The file is first encrypted using the Convergent Encryption (CE) technique and then re-encrypted using the Modified Elliptic Curve Cryptography (MECC) algorithm. The proposed method can recognize data redundancy at the block level, reducing the redundancy of data more effectively. Testing results show that the proposed approach can outperform a few state-of-the-art methods of computational efficiency and security levels.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Youngjoo Shin ◽  
Junbeom Hur ◽  
Dongyoung Koo ◽  
Joobeom Yun

With the proliferation of new mobile devices, mobile cloud computing technology has emerged to provide rich computing and storage functions for mobile users. The explosive growth of mobile data has led to an increased demand for solutions that conserve storage resources. Data deduplication is a promising technique that eliminates data redundancy for storage. For mobile cloud storage services, enabling the deduplication of encrypted data is of vital importance to reduce costs and preserve data confidentiality. However, recently proposed solutions for encrypted deduplication lack the desired level of security and efficiency. In this paper, we propose a novel scheme for serverless efficient encrypted deduplication (SEED) in mobile cloud computing environments. Without the aid of additional servers, SEED ensures confidentiality, data integrity, and collusion resistance for outsourced data. The absence of dedicated servers increases the effectiveness of SEED for mobile cloud storage services, in which user mobility is essential. In addition, noninteractive file encryption with the support of lazy encryption greatly reduces latency in the file-upload process. The proposed indexing structure (D-tree) supports the deduplication algorithm and thus makes SEED much more efficient and scalable. Security and performance analyses prove the efficiency and effectiveness of SEED for mobile cloud storage services.


Author(s):  
Pasquale Puzio ◽  
Refik Molva ◽  
Melek Önen ◽  
Sergio Loureiro

With the continuous increase of the number of users and the size of their data, data deduplication becomes a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of deduplication unfortunately come with a high cost in terms of new security and privacy challenges. In this chapter we propose ClouDedup, a secure and efficient storage service which assures block-level deduplication and data confidentiality at the same time. Although ClouDedup is based on convergent encryption, it remains secure thanks to the definition of a component that implements an additional encryption operation. Furthermore, as the requirement for deduplication at block-level raises an issue with respect to key management, we suggest to include a new component in order to implement the key management for each block together with the actual deduplication operation. In this chapter we show how we have implemented the proposed architecture, the challenges we have met and our solutions to these challenges.


Sign in / Sign up

Export Citation Format

Share Document