Open Access Open Access  Restricted Access Subscription Access

Effectuation of Secure Authorized Deduplication in Hybrid Cloud


Affiliations
1 Department of Information Technology, School of Computing Sciences, Vels University, Chennai – 600117, Tamil Nadu, India
 

Objectives: Different user can access the same data repeatedly and trying to store it in the memory of the cloud server. Due to this there is a problem of maintaining the storage space and bandwidth. The main purpose of this study is how the data is secured, whether the authorized person is accessing the data or not and finally to check whether same data is repeatedly stored in the memory to avoid duplication of the data. Methods: In deduplication, to guard the confidentiality of sensitive information, it's encrypted/decrypted by the planned convergent coding technique before outsourcing for higher protection of knowledge security. Findings: The convergent encryption method and open authorization protocol and deduplication are combined together and check the data for deduplication in a secured way. The possibilities of using other algorithms are also considered for further implementation.

Keywords

Authorized Duplicate Check, Confidentiality, Deduplication, Hybrid Cloud, Open Authorization
User

Abstract Views: 190

PDF Views: 0




  • Effectuation of Secure Authorized Deduplication in Hybrid Cloud

Abstract Views: 190  |  PDF Views: 0

Authors

B. Mahalakshmi
Department of Information Technology, School of Computing Sciences, Vels University, Chennai – 600117, Tamil Nadu, India
G. Suseendran
Department of Information Technology, School of Computing Sciences, Vels University, Chennai – 600117, Tamil Nadu, India

Abstract


Objectives: Different user can access the same data repeatedly and trying to store it in the memory of the cloud server. Due to this there is a problem of maintaining the storage space and bandwidth. The main purpose of this study is how the data is secured, whether the authorized person is accessing the data or not and finally to check whether same data is repeatedly stored in the memory to avoid duplication of the data. Methods: In deduplication, to guard the confidentiality of sensitive information, it's encrypted/decrypted by the planned convergent coding technique before outsourcing for higher protection of knowledge security. Findings: The convergent encryption method and open authorization protocol and deduplication are combined together and check the data for deduplication in a secured way. The possibilities of using other algorithms are also considered for further implementation.

Keywords


Authorized Duplicate Check, Confidentiality, Deduplication, Hybrid Cloud, Open Authorization



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i25%2F134897