IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Survey Of Secure And Deduplication Frameworks For Cloud Based Applications

[Full Text]

 

AUTHOR(S)

Dr.G.Sushmitha Valli, Harika Arete

 

KEYWORDS

Cloud computing, security, deduplication, secure deduplication

 

ABSTRACT

In the contemporary era, data is growing rapidly and it is assuming characteristics of big data. Such data is outsourced to cloud infrastructure to have benefits like availability, scalability and affordability. However, there are issues related to storing duplicates copies of data. When data is duplicated, it causes storage overhead. Deduplication is the process of identifying and elimination of redundant copies of data in cloud. It allows one instance of data to be saved permanently and its duplicate copies will not have actual data but a reference to the same copy of saved data. It is widely used in cloud computing for backup technology to improve efficiency. Data compression and deduplication are two important techniques used by cloud service providers (CSPs) to optimize utilization of space in storage media. Data deduplication may take place at file level or block level. Deduplication may be made at source or the target end. Source deduplication consumes more processing power and it becomes difficult to handle it with existing resources. The target deduplication takes place in the backup system, probably in cloud storage which will be easier to get deployed. In many cloud based applications, there is need for performance optimization with secure deduplication. In this paper, a survey of different deduplication techniques is made to provide useful insights.

 

REFERENCES

[1] Zhang, Y., Xu, C., Li, H., Yang, K., Zhou, J., & Lin, X. (2018). HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems. IEEE Transactions on Industrial Informatics, 1–11.
[2] He, X., Jin, R., & Dai, H. (2018). Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT. IEEE Internet of Things Journal, 1–8.
[3] Xu, G., Li, H., Tan, C., Liu, D., Dai, Y., & Yang, K. (2017). Achieving efficient and privacy-preserving truth discovery in crowd sensing systems. Computers & Security, 69, 114–126.
[4] A. Elmagarmid, P. Ipeirotis, and V. Verykios. Duplicaterecord detection: A survey. Knowledge and Data Engineering,IEEE Transactions on, 19:1-16, 2007.
[5] Y. Wang and S. Madnick. The Inter-Database Instance Identification Problem in Integrating Autonomous Systems. In Proceedings of the Fifth International Conference on Data Engineering, pages 46-55, Washington, DC, USA, 1989. IEEE Computer Society.
[6] http://www.linux-mag.comlidl7535
[7] H. Li, Y. Yang, Y. Dai, J. Bai, S. Yu, and Y. Xiang, “Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data,” IEEE Transactions on Cloud Computing, 2017, to appear.
[8] M.Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Proceedings of EUROCRYPT. Springer, 2013, pp. 296–312.
[9] M.Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Server-aided encryption for deduplicated storage,” in Proceedings of USENIX Security Symposium. USENIX, 2013, pp. 179–194.
[10] “Smartphones as practical and secure location verification tokens for payments,” in Proceedings of NDSS. Internet Society, 2014, pp. 1–15.
[11] Y. Zhang, C. Xu, H. Li, and X. Liang, “Cryptographic public verification of data integrity for cloud storage systems,” IEEE Cloud Computing, vol. 3, no. 5, pp. 44–52, 2016.
[12] http://www.snia.orglsearch?cx=001200299847728093177%3A3rwmjfd m8ae&cof=FORID%3AII&q=data+deduplication&sa=Go#994
[13] http://bbs.chinabyte.comlthread-393434-1-I.htrnl
[14] http://storage.chinaunix.netlstor/c/
[15] Austin Clements, Irfan Ahmad, MuraliVilayannur, and Jinyuan Li. Decentralized deduplication in san cluster file systems. In Proc. of the USENIX Annual Technical Conference, June 2009.
[16] J. Li, C. Qin, P. P. Lee, and X. Zhang, “Information leakage in encrypted deduplication via frequency analysis,” in Proceedings of DSN. IEEE, 2017, pp. 1–12.
[17] D. T. Meyer and W. J. Bolosky, “A study of practical deduplication,” ACM Transactions on Storage, vol. 7, no. 4, 2012.
[18] J. Xu, E. Chang, and J. Zhou, “Weak leakage-resilient client-side deduplication of encrypted data in cloud storage,” in Proceedings of ASIACCS. ACM, 2013, pp. 195–206.
[19] Miao, M., Wang, J., Li, H., & Chen, X. (2015). Secure multi-server-aided data deduplication in cloud computing. Pervasive and Mobile Computing, 24, 129–137.
[20] Shin, Y., Koo, D., &Hur, J. (2017). A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems. ACM Computing Surveys, 49(4), 1–38.