Secure Data Duplication Checking with Backup Recovery in Big Data Environments
-
Published:2020-08-25
Issue:
Volume:
Page:561-566
-
ISSN:2456-3307
-
Container-title:International Journal of Scientific Research in Computer Science, Engineering and Information Technology
-
language:en
-
Short-container-title:IJSRCSEIT
Author:
V Gokulakrishnan1, B Illakiya2
Affiliation:
1. Assistant Professor, Department of CSE, Dhanalakshmi Srinivasan Engineering College , Perambalur, Tamil Nadu, India 2. Department of CSE, Dhanalakshmi Srinivasan Engineering College , Perambalur, Tamil Nadu, India
Abstract
With the rapidly increasing amounts of data produced worldwide, networked and multi- user storage systems are becoming very popular. However, concerns over data security still prevent many users from migrating data to remote storage. The conventional solution is to encrypt the data before it leaves the owner’s premises. While sound from a security perspective,this approach prevents the storage provider from effectively applying storage efficiency functions, such as compression and deduplication, which would allow optimal usage of the resources and consequently lower service cost. Client-side data deduplication in particular ensures that multiple uploads of the same content only consume network bandwidth and storage space of a single upload. Deduplication is actively used by a number of backup providers as well as various data services. In this project, we present a scheme that permits the storage without duplication of multiple types of files. And also need the intuition is that outsourced data may require different levels of protection. Based on this idea, we design an encryption scheme that guarantees semantic security for unpopular data and provides weaker security and better storage and bandwidth benefits for popular data. This way, data deduplication can be effective for popular data, whilst semantically secure encryption protects unpopular content. We can use the backup recover system at the time of blocking and also analyze frequent log in access system.
Publisher
Technoscience Academy
Reference10 articles.
1. D. T. Meyer, and W. J. Bolosky, “A study of practical deduplication,” Proc. USENIX Conference on File and Storage Technologies 2011 2. W. K. Ng, W. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” Proc. ACM SAC’12, 2012. 3. N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop on Cloud Computing Security, pp. 21–32, 2014. 4. P. Anderson, L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” Proc. USENIX LISA, 2010. 5. J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” IEEE Transactions on Parallel and Distributed Sytems, Vol. 25, No. 6, 2014.
|
|