Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Prevention of Big Data by Secure Deduplication in Cloud Storage


Affiliations
1 CSE Department, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India
     

   Subscribe/Renew Journal


As we seen Big data include a huge amount of data or massive data. Nowadays generation big data increases everywhere like microblogs and cloud storage also. Big data have three basic characteristics, velocity, volume, and variety. It is important to think about the storage capacity of cloud, speed and time while uploading and downloading the data in the cloud. Deduplication scheme utilizes to reduce the area and bandwidth requirements of services by removing redundant data and storing a single instance of them in the cloud storage. The powerfulness of deduplication method has occurred when multiple utiliser outsource the same data to turn out to cloud storage server. But somewhere we can get a problem of security and ownership. Recently several deduplication techniques have been seen to solve this matter of security, ownership, and operation on big data can generate in the cloud. Consideration to this we devise a server-side deduplication method to prevent big data in cloud storage for encrypted data. It permits utiliser to outsource the data even when ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. By using deduplication we try to reduce space and save the time while uploading and downloading the data in cloud storage. The proposed scheme is almost effective, preventing big data and saving time. In this paper we use this method in cloud storage onwards we try to use anywhere if there is big data available.

Keywords

Big Data, Cloud Storage, Deduplication, Dynamic Ownership, Encryption.
User
Subscription Login to verify subscription
Notifications
Font Size

  • http://strata.oreilly.com/2010/01/roger-magoulas-on-big-data.html
  • G. Halevi, and H. F. Moed, “Overview of literature: The evaluation of big data as research and scientific topic,” Bibliometrics, no. 30, September 2012.
  • K. Shirudkar, and D. Motwani, “Big-data security,” International Journal of Advance Researcher in Computer Science and Software Engineering, vol. 5, no. 3, pp. 1100-1109, March 2015.
  • Dropbox, http://www.dropbox.com/
  • Waula, http://www.waula.com/
  • Mozy, http://www.mozy.com/
  • Google drive, http://drive.google.com
  • D. T. Meyer, and W. J. Bolosky, “A study of practical deduplication,” Proc. USENIX Conference on File and Storage Technologies, 2011.
  • M. Dutch, “Understanding data deduplication ratio,” SNIA, Data Management Forum, 2008.
  • W. K. Ng, W. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” Proc. ACM SAC, 2012.
  • M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data deduplication,” Proc. StorageSS’08, 2008.
  • N. Baracaldo, E. Androulaki, J. Glider, and A. Saniotti, “Reconcilling end-to-end confidentiality and the data reduction in cloud storage,” Proc. ACM Workshop on Cloud Computing Security, pp. 21-32, 2014.
  • D. Harnik, B. Pinkaj, and A. Shulman-Peleg, “Side channels in cloud services, the case of deduplication in cloud storage,” IEEE Security and Privacy, vol. 8, no. 6, pp. 40-47, 2010.
  • C. Wang, Z.-G. Qin, J. Peng, and J. Wang, “A novel encryption scheme for data deduplication system,” Proc. International Conference on Communications, Circuits and Systems (ICCCAS), pp. 265-269 2010.
  • “Malicious insider attacks to rise.” Available: http://news.bbc.co.uk/z/hi/7875904 stm
  • “Data theft linked to ex-employees.” Available: http:// www.theaustation.com.au/austnation-it/data-theptlinkedtoex-employees/story-e6frgakx-1226572351953
  • J. R. Dauceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files a serverless distributed file systems,” International Conference on Distributed Computing Systems (ICDCS), pp. 617-624, 2002.
  • P. Anderson, and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” Proc. USENIX LISA, 2010.
  • Z. Wilcox-O’Hearn, and B. Warner, “Tahoe: The least authority file systems,” Proc. ACM StorageSS’08, 2008.
  • A. Rahumed, H. C. H. Chen, Y. Yang, P. P. C. Lee, and J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,” Proc. International Workshop on Security in Could Computing, 2011.
  • M. Mulazzani, S. Schritwieser, M. Leithner, and M. Huber, “Dark clouds on the horizon: Using cloud storage as attack vector and online slack space,” Proc. USENIX Conference on Security, 2011.
  • R. Mate, and Md. S. Wajid, “Big data analysis: Data management in microblogs,” ICICCI2017-IEEE, 2017.
  • D. T. Meyer, and W. J. Bolosky, “A study of practical deduplication,” Proc. USENIX Conference on File and Storage Technologies, 2011.
  • J. Xu, E. Chang, and J. Zhou, “Leakage-resilient client-side deduplication of encrypted data in cloud storage,” ePrint, IACR. Available: http://eprint.iacr.org/2011/538

Abstract Views: 252

PDF Views: 0




  • Prevention of Big Data by Secure Deduplication in Cloud Storage

Abstract Views: 252  |  PDF Views: 0

Authors

Rashmi Gopalrao Mate
CSE Department, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India
Mohd. Saif Wajid
CSE Department, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India

Abstract


As we seen Big data include a huge amount of data or massive data. Nowadays generation big data increases everywhere like microblogs and cloud storage also. Big data have three basic characteristics, velocity, volume, and variety. It is important to think about the storage capacity of cloud, speed and time while uploading and downloading the data in the cloud. Deduplication scheme utilizes to reduce the area and bandwidth requirements of services by removing redundant data and storing a single instance of them in the cloud storage. The powerfulness of deduplication method has occurred when multiple utiliser outsource the same data to turn out to cloud storage server. But somewhere we can get a problem of security and ownership. Recently several deduplication techniques have been seen to solve this matter of security, ownership, and operation on big data can generate in the cloud. Consideration to this we devise a server-side deduplication method to prevent big data in cloud storage for encrypted data. It permits utiliser to outsource the data even when ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. By using deduplication we try to reduce space and save the time while uploading and downloading the data in cloud storage. The proposed scheme is almost effective, preventing big data and saving time. In this paper we use this method in cloud storage onwards we try to use anywhere if there is big data available.

Keywords


Big Data, Cloud Storage, Deduplication, Dynamic Ownership, Encryption.

References