293 Hits in 5.7 sec

Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds

C. Vijayalakshmi
2020 International Journal for Research in Applied Science and Engineering Technology  
In the existing system, if the owner wants to share the data from one user to another user there are chances for some security issues to be present.  ...  To overcome the security issues, we propose a system where the data transformation is done with high security. If the uploaded data is stored directly then there are chances for data leak.  ...  PROBLEM DEFINITION This is a single-server scheme for secure cross-user deduplication with client-side encrypted data.  ... 
doi:10.22214/ijraset.2020.4087 fatcat:yxq37dzaw5br3iez3ihha3vam4

IBADedup - Image Based Authentication and Deduplication Scheme in Cloud user Group

2019 International journal of recent technology and engineering  
Thus a secure protection scheme is needed to encrypt the private information. This may prove to be a problem because the distribution and storage of a key is difficult in a cloud with dynamic users.  ...  The proposed system provides distribution of key without the need for a secure communication channel using a group manager.  ...  ClouDedup: Secure deduplication with Encrypted Data for Cloud Storage [10] Puzio, P., M olva, M., &Loureiro, S Block-level deduplication This system architecture uses a low complicated design  ... 
doi:10.35940/ijrte.d8965.118419 fatcat:m5repnpm4zef5f76bugqi7v47u

An Efficient Hybrid Data Deduplication on Clouds using CHAP and Signature based Algorithms

Shivani Sengar, Ruchika Mishra, Swati Jain
2017 International Journal of Computer Applications  
Data Deduplication refers to a method that diminishes the unnecessary facts on the storage and transmitting on the network, and is think about to be solitary of the most-enabling storage technologies that  ...  The Planned procedure applied here provides better Security in Comparison with the Existing Protocols and also provides better Data Deduplication.  ...  In the cloud stowage organization with data deduplication, untrusted entities including a cloud server and users may cause security threats to the storage system.  ... 
doi:10.5120/ijca2017913663 fatcat:uyyfvnw5fvfttccqx3ysfbd3ci

Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges [article]

Alejandro Sanchez-Gomez, Jesus Diaz, David Arroyo
2016 arXiv   pre-print
Nowadays, several free-access public cloud storage services make it possible for users to have a free backup of their assets and to manage and share them, representing a low-cost opportunity for Small  ...  However, the adoption of cloud storage involves data outsourcing, so a user does not have the guarantee about the way her data will be processed and protected.  ...  Indeed, security cannot be guaranteed unless the secret keys of encryption are not highly protected.  ... 
arXiv:1610.08727v1 fatcat:bq3q4dwb35gj5gh3pdh6pko274

Hybrid Cloud Based Deduplication Scheme Based on User's Privileges

M. Sharmila, P. Balakrishnan
2016 Indian Journal of Science and Technology  
Background/Objectives: This research work reviews different techniques to protect the data and discussed about their merits and demerits which help to realize a secured cloud deduplication environment.  ...  Applications: This approach makes us to understand the elements of good cloud deduplication framework which can be directly used by any cloud storage service provider to reduce their storage costs.  ...  However, secure deduplication in distributed storage is a quite challenging scenario.  ... 
doi:10.17485/ijst/2016/v9i48/107981 fatcat:m2a7jaoyhjfxdhnxfkkkpt363u

Study of Authorized Data Deduplication Methodology to Achieve Security in Hybrid Cloud

Priyanka Bhopale, Kanthe A.M
2016 IJARCCE  
This methodology is regularly used for dropping the storage space and save bandwidth under cloud. Also, along with deduplication for data protection and privacy the encryption methods are used.  ...  Different new deduplication constructions offered for sustaining authorized duplicate check. This paper shows how the security is obtained in hybrid cloud during the process of data deduplication.  ...  ACKNOWLEDGMENT We would like to thank the editor and anonymous reviewers for their valuable suggestions that significantly improved the quality of this paper.  ... 
doi:10.17148/ijarcce.2016.5102 fatcat:5tz26xbzmzhgnixkx64qxpkzja


Hema S
2018 International Journal of Advanced Research in Computer Science  
Secure Deduplication with Encrypted Data for Cloud Storage SHA-256/ AES key size 256 bits Block level approach  It combines features of both deduplication and convergent encryption.  ...  However, encrypted data establish new trouble for cloud data deduplication, which becomes critical for big data storage and processing in cloud. It also suffers from security weakness.  ... 
doi:10.26483/ijarcs.v9i2.5318 fatcat:utj524jui5fnpnk2nwlwcmtesi

Secure biometric authentication with de-duplication on distributed cloud storage

Vinoth Kumar M, K Venkatachalam, Prabu P, Abdulwahab Almutairi, Mohamed Abouhawwash
2021 PeerJ Computer Science  
A Gabor filter with distributed security and encryption using XOR operations is used to generate the proposed bio-key (biometric generated key) and avoid data deduplication in the cloud, ensuring avoidance  ...  With cloud information services, it is essential for information to be saved securely and to be distributed safely across numerous users.  ...  Dulari & Bhushan (2019) proposed a security system called TORDES for cloud storage. This work uses legion containers in cloud storage.  ... 
doi:10.7717/peerj-cs.569 fatcat:3d6w5i7pbfh7lllpi7x236lkbq

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

K Archana, Mrs. Shubangini Patil
2018 International Journal of Trend in Scientific Research and Development  
In this paper, we propose a novel server deduplication scheme for encrypted data.  ...  It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution.  ...  system.  The server is cannot be trusted by the data owners in cloud storage systems.  It cannot be applied to access control for cloud storage systems.  ... 
doi:10.31142/ijtsrd14486 fatcat:cepuhtoxirhezb2s27kt5xlv6q

Encrypted Big Data with Data Deduplication in Cloud

Priyanka G., B. M.
2017 International Journal of Computer Applications  
The cloud data deduplication is new challenges by the encrypted data, which is for processing in cloud and big data storage. The deduplication is not working on encrypted data.  ...  Cloud computing is a service by re-arranging resources in the Internet. Cloud service is popular for data storage. The data holder's privacy is the data stored in cloud and in the encrypted form.  ...  In encrypted data in the cloud secure k-NN classifier. This system can protect the confidentiality of data. Lichun Li et al. [5] .  ... 
doi:10.5120/ijca2017915414 fatcat:apg2vybogbbrtb4zail3l4gzz4

ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

Pasquale Puzio, Refik Molva, Melek Onen, Sergio Loureiro
2013 2013 IEEE 5th International Conference on Cloud Computing Technology and Science  
With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers.  ...  Furthermore, as the requirement for deduplication at block-level raises an issue with respect to key management, we suggest to include a new component in order to implement the key management for each  ...  RELATED WORK Many systems have been developed to provide secure storage but traditional encryption techniques are not suitable for deduplication purposes.  ... 
doi:10.1109/cloudcom.2013.54 dblp:conf/cloudcom/PuzioMOL13 fatcat:rmang7dwbjddlh42vhlhwlruwq

Deduplication for Cloud based on AES Algorithm

Data security and time constraint for data retrival from the cloud server is also taken into account while implementing the scheme  ...  This paper provides and analyses a new scheme to address the issue of everlasting cloud storage access systems by providing AES Algorithm based solution.  ...  Storage system uses ciphertext encryption policy based on attribute and also supports secure de-duplication.  ... 
doi:10.35940/ijitee.g5112.059720 fatcat:oljpyc4xfvcvfmid7ikncjzana

Design Of A Secure Virtual File Storage System On Cloud Using Hybrid Cryptography

Bello A. Buhari, Aliyu Mubarak, Bello A. Bodinga, Muazu D. Sifawa
2022 International journal of advanced networking and applications  
This research designed and implemented virtual secure file storage system on cloud using hybrid cryptography.  ...  Dependable file storage and access establish several security issues in a cloud computing.  ...  conveyed nature and other extra protection and security properties of the system and distributed storage.  ... 
doi:10.35444/ijana.2022.13508 fatcat:2si7rg5l2vcftl6bdgz5qyunoq

Security Based Deduplication with Efficient and Reliable Data Storage

J. Sreejith, A. Jeno Kalaiselvi Sathya
2017 International Journal Of Engineering And Computer Science  
To enhanced protect data security, it makes the first endeavour to formally address the problem of authorized data deduplication.  ...  Our proposed system is implemented for text file, pdf file, book,image and video, it also verify the confidentiality of private cloud.  ...  and the Merkle-based Tree, for improving data security in cloud storage systems, providing dynamic sharing between users and ensuring efficient data deduplication.  ... 
doi:10.18535/ijecs/v6i3.36 fatcat:gcnt6l6vl5cy7d4qvdcstx7ssi

Detection of File Level and Block Level Deduplication and attacks in Cloud Computing Environment

Ms. Samita Mokal
2017 International Journal Of Engineering And Computer Science  
Secure deduplication is a technique for eliminating duplicate copies of storage data, and provides security to them.  ...  In cloud computing, security and storage space management techniques are most important factors for improving the performance of cloud computing.  ...  An arising challenge is to perform secure deduplication in cloud storage even if convergent encryption is extensively adopted for secure deduplication; a critical issue is that making of convergent encryption  ... 
doi:10.18535/ijecs/v6i1.55 fatcat:qh4cvhbrs5hxrd6tnof5zer4fa
« Previous Showing results 1 — 15 out of 293 results