A REVIEW OF BIG DATA DEDUPLICATION AND DYNAMIC OWNERSHIP MANAGEMENT IN CLOUD STORAGE
Main Article Content
Abstract
Now days Bigdata distributed storage is a new cloud storage mechanism which is used to store data information through the Internet to the customers; in the interim, the customers needn't know the subtle elements and brought down structures and instruments. The proposed engineering of distributed cloud storage is layered and helpful, and the talked about key innovations include sending, stockpiling virtualization, information association, relocation, security, and so on. The operation system including biology chain, diversion hypothesis, subterranean insect province improvement, information life cycle administration, upkeep and refresh, union and advancement instruments are broke down as well. So a generally and new perspective to distributed storage framework is represented. In passed on limit associations, deduplication advancement is generally used to diminish the space and trade speed necessities of associations by butchering excess information and securing just a solitary duplicate of them. Deduplication is best when distinctive clients outsource similar information to the flowed accumulating; despite it raises issues identifying with security and proprietorship. Affirmation of-possession outlines enable any data owner information to show to the flowed accumulating server that he declares the information successfully. Regardless, different clients are likely going to encode their information beforehand outsourcing them to the dispersed accumulating to save security, yet this hampers deduplication as a result of the randomization property of encryption. Beginning late, several deduplication outlines have been proposed to deal with this issue of bigdata by engaging every data owner to have an encryption key for practically identical information. In any case, most by a wide margin of the plans experience the insidious effects of security surrenders, since they don't consider the dynamic changes in the commitment seeing information that happen as consistently as possible in a reasonable flowed amassing advantage.
Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
D. T. Meyer, and W. J. Bolosky, “A study of practical deduplication,†Proc. USENIX Conference on File and Storage Technologies, 2011.
M. Dutch, “Understanding data deduplication ratios,†SNIA Data Management Forum, 2008.
W. K. Ng, W. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,†Proc. ACM SAC’12, 2012.
M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data deduplication,†Proc. StorageSS’08, 2008.
N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-end confidentiality and data reduction in cloud storage,†Proc. ACM Workshop on Cloud Computing Security, pp. 21–32, 2014.
P. S. S. Council, “PCI SSC data security standards overview,†2013.
D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services, the case of deduplication in cloud storage,†IEEE Security & Privacy, vol. 8, no. 6, pp. 40–47, 2010.
C. Wang, Z. Qin, J. Peng, and J. Wang, “A novel encryption scheme for data deduplication system,†Proc. International Conference on Communications, Circuits and Ssytems (ICCCAS), pp. 265–269, 2010.
Malicious insider attacks to rise, http://news.bbc.co.uk/2/hi/7875904.stm
Data theft linked to ex-employees, http://www.theaustralian.com.au/australian-it/datatheftlinked- to-ex-employees/story-e6frgakx-1226572351953,2002.
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system,†Proc. International Conference on Distributed Computing Systems (ICDCS), pp. 617–624, 2002.
P. Anderson, L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,†Proc. USENIX LISA, 2010.
Z. Wilcox-O’Hearn, B. Warner, “Tahoe: the least-authority filesystem,†Proc. ACM StorageSS, 2008.
A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,†Proc. International Workshop on Security in Cloud Computing, 2011.
J. Xu, E. Chang, and J. Zhou, “Leakage-resilient client-side deduplication of encrypted data in cloud storage,†ePrint, IACR, http://eprint.iacr.org/2011/538.
M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,†Proc. Eurocrypt 2013, LNCS 7881, pp. 296–312, 2013.Cryptology ePrint Archive, Report 2012/631, 2012.
S. Halevi, D, Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,†Proc. ACM Conference on Computer and Communications Security, pp. 491–500, 2011.
M. Mulazzani, S. Schrittwieser, M. Leithner, and M. Huber, “Dark clouds on the horizon: using cloud storage as attack vector and online slack space,†Proc. USENIX Conference on Security, 2011.
A. Juels, and B. S. Kaliski, “PORs: Proofs of retrievability for large files,†Proc. ACM Conference on Computer and Communications Security, pp. 584–597, 2007.
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,†Proc. ACM Conference on Computer and Communications Security, pp. 598–609, 2007.
J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,†IEEE Transactions on Parallel and Distributed Sytems, Vol. 25, No. 6, 2014.
G.R. Blakley, and C. Meadows, “Security of Ramp schemes,†Proc. CRYPTO 1985, pp. 242–268, 1985.
J. Li, Y. K. Li, X. Chen, P. Lee, and W. Lou, “A hybrid cloud approach for secure authorized deduplication,†IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 5, pp. 1206–1216, 2015.
M. Bellare, S. Keelveedhi, T. Ristenpart, “DupLESS: Serveraided encryption for deduplicated storage,†Proc. USENIX Security Symposium, 2013.
M. Bellare, S. Keelveedhi, “Interactive message-locked encryption and secure deduplication,†Proc. PKC 2015, pp. 516–538, 2015.
Y. Shin and K. Kim, “Equality predicate encryption for secure data deduplication,†Proc. Conference on Information Security and Cryptology (CISC-W), pp. 64–70, 2012.
X. Jin, L. Wei, M. Yu, N. Yu and J. Sun, “Anonymous deduplication of encrypted data with proof of ownership in cloud storage,†Proc. IEEE Conf. Communications in China (ICCC), pp.224-229, 2013.
D. Naor, M. Naor, and J. Lotspiech, â€Revocation and tracing schemes for stateless receivers,†Proc. CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 41–62, 2001.