A REVIEW OF BIG DATA DEDUPLICATION AND DYNAMIC OWNERSHIP MANAGEMENT IN CLOUD STORAGE

Main Article Content

Rashmi Mate
Mohd. Saif Wajid

Abstract

Now days Bigdata distributed storage is a new cloud storage mechanism which is used to store data information through the Internet to the customers; in the interim, the customers needn't know the subtle elements and brought down structures and instruments. The proposed engineering of distributed cloud storage is layered and helpful, and the talked about key innovations include sending, stockpiling virtualization, information association, relocation, security, and so on. The operation system including biology chain, diversion hypothesis, subterranean insect province improvement, information life cycle administration, upkeep and refresh, union and advancement instruments are broke down as well. So a generally and new perspective to distributed storage framework is represented. In passed on limit associations, deduplication advancement is generally used to diminish the space and trade speed necessities of associations by butchering excess information and securing just a solitary duplicate of them. Deduplication is best when distinctive clients outsource similar information to the flowed accumulating; despite it raises issues identifying with security and proprietorship. Affirmation of-possession outlines enable any data owner information to show to the flowed accumulating server that he declares the information successfully. Regardless, different clients are likely going to encode their information beforehand outsourcing them to the dispersed accumulating to save security, yet this hampers deduplication as a result of the randomization property of encryption. Beginning late, several deduplication outlines have been proposed to deal with this issue of bigdata by engaging every data owner to have an encryption key for practically identical information. In any case, most by a wide margin of the plans experience the insidious effects of security surrenders, since they don't consider the dynamic changes in the commitment seeing information that happen as consistently as possible in a reasonable flowed amassing advantage.

 

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

D. T. Meyer, and W. J. Bolosky, “A study of practical deduplication,†Proc. USENIX Conference on File and Storage Technologies, 2011.

M. Dutch, “Understanding data deduplication ratios,†SNIA Data Management Forum, 2008.

W. K. Ng, W. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,†Proc. ACM SAC’12, 2012.

M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data deduplication,†Proc. StorageSS’08, 2008.

N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-end confidentiality and data reduction in cloud storage,†Proc. ACM Workshop on Cloud Computing Security, pp. 21–32, 2014.

P. S. S. Council, “PCI SSC data security standards overview,†2013.

D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services, the case of deduplication in cloud storage,†IEEE Security & Privacy, vol. 8, no. 6, pp. 40–47, 2010.

C. Wang, Z. Qin, J. Peng, and J. Wang, “A novel encryption scheme for data deduplication system,†Proc. International Conference on Communications, Circuits and Ssytems (ICCCAS), pp. 265–269, 2010.

Malicious insider attacks to rise, http://news.bbc.co.uk/2/hi/7875904.stm

Data theft linked to ex-employees, http://www.theaustralian.com.au/australian-it/datatheftlinked- to-ex-employees/story-e6frgakx-1226572351953,2002.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system,†Proc. International Conference on Distributed Computing Systems (ICDCS), pp. 617–624, 2002.

P. Anderson, L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,†Proc. USENIX LISA, 2010.

Z. Wilcox-O’Hearn, B. Warner, “Tahoe: the least-authority filesystem,†Proc. ACM StorageSS, 2008.

A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,†Proc. International Workshop on Security in Cloud Computing, 2011.

J. Xu, E. Chang, and J. Zhou, “Leakage-resilient client-side deduplication of encrypted data in cloud storage,†ePrint, IACR, http://eprint.iacr.org/2011/538.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,†Proc. Eurocrypt 2013, LNCS 7881, pp. 296–312, 2013.Cryptology ePrint Archive, Report 2012/631, 2012.

S. Halevi, D, Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,†Proc. ACM Conference on Computer and Communications Security, pp. 491–500, 2011.

M. Mulazzani, S. Schrittwieser, M. Leithner, and M. Huber, “Dark clouds on the horizon: using cloud storage as attack vector and online slack space,†Proc. USENIX Conference on Security, 2011.

A. Juels, and B. S. Kaliski, “PORs: Proofs of retrievability for large files,†Proc. ACM Conference on Computer and Communications Security, pp. 584–597, 2007.

G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,†Proc. ACM Conference on Computer and Communications Security, pp. 598–609, 2007.

J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,†IEEE Transactions on Parallel and Distributed Sytems, Vol. 25, No. 6, 2014.

G.R. Blakley, and C. Meadows, “Security of Ramp schemes,†Proc. CRYPTO 1985, pp. 242–268, 1985.

J. Li, Y. K. Li, X. Chen, P. Lee, and W. Lou, “A hybrid cloud approach for secure authorized deduplication,†IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 5, pp. 1206–1216, 2015.

M. Bellare, S. Keelveedhi, T. Ristenpart, “DupLESS: Serveraided encryption for deduplicated storage,†Proc. USENIX Security Symposium, 2013.

M. Bellare, S. Keelveedhi, “Interactive message-locked encryption and secure deduplication,†Proc. PKC 2015, pp. 516–538, 2015.

Y. Shin and K. Kim, “Equality predicate encryption for secure data deduplication,†Proc. Conference on Information Security and Cryptology (CISC-W), pp. 64–70, 2012.

X. Jin, L. Wei, M. Yu, N. Yu and J. Sun, “Anonymous deduplication of encrypted data with proof of ownership in cloud storage,†Proc. IEEE Conf. Communications in China (ICCC), pp.224-229, 2013.

D. Naor, M. Naor, and J. Lotspiech, â€Revocation and tracing schemes for stateless receivers,†Proc. CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 41–62, 2001.