Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Hybrid Cloud System for Authorized Deduplication with Improved Security Using Dual Encryption


Affiliations
1 Department of Computer Science and Engineering, Malabar College of Engineering and Technology, Thrissur, India
     

   Subscribe/Renew Journal


Nowadays the increasing volume of data in the cloud is a critical challenge faced by the cloud computing environment. Data deduplication is a well known technique and it can be used for eliminating the redundant copies of the data from the cloud by keeping only single physical copy of the data. The deduplication can be make authorized by considering the privileges of the user during the deduplication procedure. For making deduplication possible, convergent encryption scheme is used for encrypting the data before outsourcing it to the cloud server. For improving the security of the data Dual encryption procedure is applied by generating the encryption keys from the data itself.


Keywords

Deduplication, Hybrid Cloud, Convergent Encryption, File Token.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 213

PDF Views: 3




  • A Hybrid Cloud System for Authorized Deduplication with Improved Security Using Dual Encryption

Abstract Views: 213  |  PDF Views: 3

Authors

A. K. Diyab
Department of Computer Science and Engineering, Malabar College of Engineering and Technology, Thrissur, India
A. Ambarish
Department of Computer Science and Engineering, Malabar College of Engineering and Technology, Thrissur, India

Abstract


Nowadays the increasing volume of data in the cloud is a critical challenge faced by the cloud computing environment. Data deduplication is a well known technique and it can be used for eliminating the redundant copies of the data from the cloud by keeping only single physical copy of the data. The deduplication can be make authorized by considering the privileges of the user during the deduplication procedure. For making deduplication possible, convergent encryption scheme is used for encrypting the data before outsourcing it to the cloud server. For improving the security of the data Dual encryption procedure is applied by generating the encryption keys from the data itself.


Keywords


Deduplication, Hybrid Cloud, Convergent Encryption, File Token.