Design and Implementation of a Hybrid Cloud Approach for Secure Authorized Deduplication

Satish Khadke, Sayyed Mustafa, Syed Akhtar
2017 International Journal of Computer Applications  
Data deduplication began to emerge approximately ten years ago, but has only recently become a important technology and also it is one of important data compression techniques to eliminate duplicate copies of data. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. Here new deduplication constructions supporting authorized duplicate check in this hybrid cloud architecture are presented.
more » ... y analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
doi:10.5120/ijca2017913543 fatcat:ebmnyfkemzbrblqog4l63abi2a