A MIX CLOUD TO ELIMINATE REPLICA DATA CERTIFIED SAFE APPROACH
Abstract
Previous systems cannot support differential authorization duplicate check, in lots of applications. Within the recent occasions, structural design was offered that comprised of dual clouds for effective outsourcing of understanding in addition to arbitrary computations towards an untrustworthy commodity cloud. With the development of cloud-computing, efficient secure data deduplication has attracted much concentration in recent occasions from research community. Data deduplication is a committed data compression technique that's generally introduced for eliminating duplicate copies of repeating storage data. Dissimilar to established systems, private cloud is provided like a proxy towards permitting data owner to safely execute duplicate check by differential legal rights and so this architecture is helpful and provides attracted much consideration from researchers. Within our work we solve impracticality of deduplication by differential legal rights within cloud-computing, we produce a hybrid cloud structural design comprised of everyone cloud and cloud.
Keywords
References
S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.
A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud Computing, 2011.
M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.
S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.
R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.