26Jun 2017

A SURVEY ON SECURE DEDUPLICATION SCHEMES.

  • Dept. of CSE, (CNIS), SGGS IE & T, Nanded, India.
  • Dept of CSE(CNIS), SGGS IE & T, Nanded, India.
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

In today's world as we all know the cloud computing performs a number of operations on data. The valuable information from the set of data is extracted as per their need. Nowadays it becomes trend to be a part of digitalization. Digital libraries contains huge amounts of data. Most of the times while data storage the number of copies of the same data are stored, again and again, so to remove such duplicate data copies we need a Deduplication technique. The deduplication removes unnecessary data, but at the same time, it is beneficial if it retrieves it with more reliability.Thispaper, represents the detail study of various approaches to improve the reliability of data after removing duplicate copies in data storage. The use of such deduplication schemes also reduces the data transfer rate to upload and download data .The time consumption should be less which will effect on its accessibility.


  1. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, ?Proofs of ownership in remote storage systems.? in ACM Conference on Computer and Communications Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491?500.
  2. Bellare, Sriram. Keelveedhi, and T. Ristenpart, ?Dupless: Server aided encryption for deduplicated storage,? in USENIX Security Symposium, 2013.
  3. ?Secure deduplication with efficient and reliable convergent key management? by? li,Chen, jingwei,parteic and? W.Lou ,in IEEE 2013.
  4. ? A Survey on Deduplication Scheme in Cloud Storage? of author Deepa D.,Revathi M.
  5. ?An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
  6. ?in IEEE transactions in 2012 ,Author K. yang and X.jia.
  7. ?Fingerprinting by random polynomials?,by M. Rabin in 1981.
  8. ?How to share secret? by Adi Shamir in ACM commun.,1979.
  9. Multiple Ramp schemes?,by A. santis and B.Masuci in IEEE Transactions july 1999.
  10. ?Message Locked Encryption in secure deduplication?in Eurocrypt,2013.
  11. ?A Secure data deduplication scheme for cloud storage?in technical Report,2013 by J.Stanek,A. Sorniotti,Androulaki,kenel L.
  12. ?Efficient dispersal of information for security ,loadbalancing,fault tolerance? in ACM journal 1989,M.Rabin.
  13. ?Reclaiming Space from Duplicate Files in a Serverless Distributed File System?. John R.Douceur, AtulAdya, William J. Bolosky, D.Simon, M. TheimerMicrosoft .
  14. ?A Survey on Data Deduplication in Cloud Storage Environment?,in IJSRET 2015.by Mani U.V.,G. Mohan

[Anita A. Kundgir, Kalyani P. Daberao and S. S. Hatkar. (2017); A SURVEY ON SECURE DEDUPLICATION SCHEMES. Int. J. of Adv. Res. 5 (Jun). 1787-1792] (ISSN 2320-5407). www.journalijar.com


Anita A. Kundgir
SGGS IE & T,vishnupuri Nanded.

DOI:


Article DOI: 10.21474/IJAR01/4604      
DOI URL: https://dx.doi.org/10.21474/IJAR01/4604