preview

Nt1310 Unit 3 Data Deduplication

Best Essays

7.CONCLUSION Thought of information deduplication was proposed to ensure the information security by including differential power of Data Owner in the copy check. In cloud server our information are safely store in scrambled format,and additionally in Key server our key is store with individual document. The presentation of a couple of beginning deduplication advancements invigorating endorsed copy duplicate in crossover cloud structural engineering, in that the copy check tokens of records are induced by the private cloud server having private keys. Security check shows that the systems are secure with respect to insider and pariah attacks point by point in the proposed security model. As an issue confirmation of origination, …show more content…

Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010. [3] M. Bellare, S. Keelveedhi, and T.Ristenpart. Dupless: Serveraided encryption for deduplicate storage. In USENIX SecuritySymposium, 2013. [4] M. Bellare, S. Keelveedhi, and T.Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013. [5] M. Bellare, C. Namprempre, and G. Neven. Security proofs foridentity-based identification and signature schemes. J. Cryptology,22(1):1–61, 2009. [6] M. Bellare and A. Palacio. Gq and schnorr identification schemes:Proofs of security against impersonation under active and concurrentattacks. In CRYPTO, pages 162–177, 2002. [7] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011. [8] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless distributedfile system. In ICDCS, pages 617–624, 2002. [9] D. Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC NationalComputer Security Conf., …show more content…

Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure deduplicationwith efficient and reliable convergent key management. In IEEETransactions on Parallel and Distributed Systems, 2013. [13] libcurl. http://curl.haxx.se/libcurl/. [14] C. Ng and P. Lee. Revdedup: A reverse deduplication storagesystem optimized for reads to latest backups. In Proc. of APSYS,Apr 2013.12 [15] W. K. Ng, Y. Wen, and H. Zhu. Private data deduplicationprotocols in cloud storage. In S. Ossowski and P. Lecca, editors,Proceedings of the 27th Annual ACM Symposium on Applied Computing,pages 441–446. ACM, 2012. [16] R. D. Pietro and A. Sorniotti. Boosting efficiency and securityin proof of ownership for deduplication. In H. Y. Youm andY. Won, editors, ACM Symposium on Information, Computer andCommunications Security, pages 81–82. ACM, 2012. [17] S. Quinlan and S. Dorward. Venti: a new approach to archivalstorage. In Proc. USENIX FAST, Jan 2002. [18] A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S.Lui. A secure cloud backup system with assured deletion andversion control. In 3rd International Workshop on Security in CloudComputing,

Get Access