SECURE ENDORSED AVOIDING REPETITION IN PUBLIC AND PRIVATE APPROACH

T. Monica, M.Bhanu Prakash, J. Deepthi

Abstract


Previous systems cannot support differential authorization duplicate check, in several applications. Inside the recent occasions, structural design was offered that made up of dual clouds for effective outsourcing of understanding furthermore to arbitrary computations towards an untrustworthy commodity cloud. With the introduction of cloud-computing, efficient secure data deduplication has attracted much concentration in recent occasions from research community. Data deduplication may well be a committed data compression technique that's generally introduced for eliminating duplicate copies of repeating storage data. Different to established systems, private cloud is supplied as being a proxy towards permitting data owner to securely execute duplicate check by differential legal rights and thus this architecture is useful and offers attracted much consideration from researchers.   Inside our work we solve impracticality of deduplication by differential legal rights within cloud-computing, we create a hybrid cloud structural design made up of everybody cloud and cloud.


Keywords


Cloud Computing; Public Cloud; Outsourcing; Twin Clouds; Data Storage;

References


S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.

A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud Computing, 2011.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.