scholarly journals Secure Data Deduplication in Cloud Environments

Author(s):  
Fatema Rashid

With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, CSPs often employ data dedplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users' privacy concerns, as these techniques typically require full access to data. In this thesis, we propose solutions for different data types (text, image and video) for secure data deduplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. We use different image and video processing techniques, such as data compression, in order to further improve the efficiency of our proposed schemes. The security of the deduplication schemes is provided by applying suitable encryption schemes and error correcting codes. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes.

2021 ◽  
Author(s):  
Fatema Rashid

With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, CSPs often employ data dedplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users' privacy concerns, as these techniques typically require full access to data. In this thesis, we propose solutions for different data types (text, image and video) for secure data deduplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. We use different image and video processing techniques, such as data compression, in order to further improve the efficiency of our proposed schemes. The security of the deduplication schemes is provided by applying suitable encryption schemes and error correcting codes. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes.


With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. we propose solutions for different data types (text, image and video) for secure data de-duplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes. proposes a method to improve the read performance by investigating the recently accessed chunks and their locality in the backup set (data stream). Based on this study of the distribution of chunks in the data stream, few chunks are identified that need to be accumulated and stored to serve the future read requests better. This identification and accumulation happen on cached chunks. By this a small degree of duplication of the de-duplicated data is introduced, but by later caching them together during the restore of the same data stream, the read performance is improved. Finally the read performance results obtained through experiments with trace datasets are presented and analyzed to evaluate the design.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


Cloud computing is an emerging computing environment which facilitates on demand services. As it contributes a large pool of computing resources, scheduling of tasks in an efficient manner is one of the main problems. Poor allocation of tasks affects the performance of the whole system. Hence it is very important to schedule the tasks for better utilization of resources by allocating them properly to particular resources in particular time. Efficient scheduling algorithms fulfill the user requirements and also satisfy the needs of the cloud service providers without affecting the performance of the environment. Execution Time based Sufferage Algorithm (ETSA), Cost and Completion Time based Sufferage Algorithm (CCTSA) and Modified Artificial Fish Swarm(MAFSA) Algorithm are efficient task scheduling approaches developed in cloud environment. These algorithms considered the parameters such as makespan, cost and resource utilization while scheduling the tasks and produced better performance. This paper presents a scheduling framework which converts the above said algorithms in to services and deployed in the cloud. Depends on the user’s requirements, the services will be delivered.


The widespread adoption of multi-cloud in enterprises is one of the root causes of cost-effectiveness. Cloud service providers reduce storage costs through advanced data de-duplication, which also provides vulnerabilities for attackers. Traditional approaches to authentication and data security for a single cloud need to be upgraded to be best suitable for cloud-to-cloud data migration security in order to mitigate the impact of dictionary and template attacks on authentication and data integrity, respectively. This paper proposes a scheme of user layer authentication along with lightweight cryptography. The proposed simulates its mathematical model to analyze the behavioral pattern of time-complexity of data security along with user auth protection. The performance pattern validates the model for scalability and reliability against both authentication and data integrity.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2817
Author(s):  
Zhen-Yu Wu

“Education Cloud” is a cloud-computing application used in educational contexts to facilitate the use of comprehensive digital technologies and establish data-based learning environments. The immense amount of digital resources, data, and teaching materials involved in these environments must be stored in robust data-access systems. These systems must be equipped with effective security mechanisms to guarantee confidentiality and ensure the integrity of the cloud-computing environment. To minimize the potential risk of privacy exposure, digital sharing service providers must encrypt their digital resources, data, and teaching materials, and digital-resource owners must have complete control over what data or materials they share. In addition, the data in these systems must be accessible to e-learners. In other words, data-access systems should not only encrypt data, but also provide access control mechanisms by which users may access the data. In cloud environments, digital sharing systems no longer target single users, and the access control by numerous users may overload a system and increase management burden and complexity. This study addressed these challenges to create a system that preserves the benefits of combining digital sharing systems and cloud computing. A cloud-based and learner-centered access control mechanism suitable for multi-user digital sharing was developed. The proposed mechanism resolves the problems concerning multi-user access requests in cloud environments and dynamic updating in digital-sharing systems, thereby reducing the complexity of security management.


2015 ◽  
pp. 1702-1720
Author(s):  
Yoshito Kanamori ◽  
Minnie Yi-Miin Yen

Cloud computing is changing the way corporate computing operates and forcing the rapid evolution of computing service delivery. It is being facilitated by numerous technological approaches and a variety of business models. Although utilizing the infrastructure of existing computing and networking technologies, different cloud service providers (CSPs) are able to unite their efforts and address a much broader business space. As a result, confusion has emerged and questions have risen from both Information Technology (IT) and business communities. How cloud environments differ from traditional models, and how these differences affect their adoption are of major importance. In this chapter, the authors first clarify misperceptions by introducing the new threats and challenges involved in cloud environments. Specifically, security issues and concerns will be depicted in three practical scenarios designed to illuminate the different security problems in each cloud deployment model. The chapter also further discusses how to assess and control the concerns and issues pertaining to the security and risk management implementations.


Cloud storage is one of the key features of cloud computing, which helps cloud users outsource large numbers of data without upgrading their devices. However, Cloud Service Providers (CSPs) data storage faces problems with data redundancy. The data deduplication technique aims at eliminating redundant information segments and maintains one single instance of the data set, even if any number of users own similar data set. Since blocks of data are spread on many servers, each block of the file has to be downloaded before restoring the file to decrease system output. We suggest a cloud storage server data recovery module to improve file access efficiency and reduce time spent on network bandwidth. Device coding is used in the suggested method to store blocks in distributed cloud storage, and for data integrity, MD5 (Message Digest 5) is used. Running recovery algorithm helps the user to retrieve a file directly from the cloud servers without downloading every block. The scheme proposed improves system time efficiency and the ability to access the stored data quickly. This reduces bandwidth consumption and reduces overhead user processing while downloading the data file.


Author(s):  
Yoshito Kanamori ◽  
Minnie Yi-Miin Yen

Cloud computing is changing the way corporate computing operates and forcing the rapid evolution of computing service delivery. It is being facilitated by numerous technological approaches and a variety of business models. Although utilizing the infrastructure of existing computing and networking technologies, different cloud service providers (CSPs) are able to unite their efforts and address a much broader business space. As a result, confusion has emerged and questions have risen from both Information Technology (IT) and business communities. How cloud environments differ from traditional models, and how these differences affect their adoption are of major importance. In this chapter, the authors first clarify misperceptions by introducing the new threats and challenges involved in cloud environments. Specifically, security issues and concerns will be depicted in three practical scenarios designed to illuminate the different security problems in each cloud deployment model. The chapter also further discusses how to assess and control the concerns and issues pertaining to the security and risk management implementations.


Author(s):  
Shivani Bajaj

Energy Efficiency can be defined as reduction of energy used by a given service or level of activity. In spite of scale and complexity of data centre equipment it can be highly difficult to define the proper activity that could be examined for the efficiency of energy. So there can be four scenarios which may define within the system where the energy is not utilised in an efficient manner. The main goal of Cloud service providers is creation of usage of Cloud computing resources proficiently for efficient cloud computing. Cloud computing has many serious issues such as load manager, security and fault tolerance. This chapter discusses the energy efficient approaches in cloud computing environment. The energy efficiency has become the major concern for the service providers. In this chapter, the major concern is the high lightly of resource allocation challenges and there are some which will be given in the data center energy consumption. The focus is done on the power management task and even the virtualization of saving the energy.


Sign in / Sign up

Export Citation Format

Share Document