SECURE DEDUP WITH ENCRYPTED DATA

Senthiselvan, N, Anjali, G, Kesini, B and Subramaniyaswamy, V SECURE DEDUP WITH ENCRYPTED DATA. International Journal of Pure and Applied Mathematics, 2018, vol. 119, n. 12, pp. 13221-13231. [Journal article (Paginated)]

[thumbnail of 1205.pdf]
Preview
Text
1205.pdf

Download (531kB) | Preview

English abstract

Cloud computing is one of the way of service provision over the internet today. Cloud computing is the developing a next level from the last decades. One of the drawbacks, cloud storage is a privacy security at the CSP. So, the chunks users stored by the encrypted data for the purpose of security. Cloud storage vendors which allow to decreases chunked data and more efficient storage saver. One of the best techniques is deduplication, duplicate data is stored only once .In this paper, propose a checksum algorithm for distributing objects to agents, in a way that improves our chances of identifying a leaker. We evaluate its performance based on effective and efficient storage level. Its support data access control and revocation at the same time.

Item type: Journal article (Paginated)
Keywords: privacy security, encrypted data, deduplication, checksum algorithm
Subjects: B. Information use and sociology of information
B. Information use and sociology of information > BC. Information in society.
Depositing user: Raster Daster
Date deposited: 02 Aug 2018 07:33
Last modified: 02 Aug 2018 07:33
URI: http://hdl.handle.net/10760/33264

References

1. Bellare, M., Keelveedhi, S., & Ristenpart, T. (2013). DupLESS: Server-Aided Encryption for Deduplicated Storage. IACR Cryptology ePrint Archive, 2013, 429.

2. Dropbox, A file-storage and sharing service,(2016). [Online]. Available: http://www.dropbox.com

3. GoogleDrive,(2016).[Online].Available: http://drive.google.com

4. Mozy, Mozy: A File-storage and Sharing Service. (2016). [Online]. Available: http://mozy.com/

5. Douceur, J. R., Adya, A., Bolosky, W. J., Simon, P., & Theimer, M. (2002). Reclaiming space from duplicate files in a serverless distributed file system. In Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on (pp. 617-624). IEEE.

6. Wu, T., Dou, W., Hu, C., & Chen, J. (2017). Service mining for trusted service composition in cross-cloud environment. IEEE Systems Journal, 11(1), 283-294.

7. Yan, Z., Ding, W., Yu, X., Zhu, H., & Deng, R. H. (2016). Deduplication on encrypted big data in cloud. IEEE transactions on big data, 2(2), 138-150.

8. Wu, T. Y., Pan, J. S., & Lin, C. F. (2014). Improving accessing efficiency of cloud storage using de-duplication and feedback schemes. IEEE Systems Journal, 8(1), 208-218.

9. Fan, C. I., Huang, S. Y., & Hsu, W. C. (2012, August). Hybrid data deduplication in cloud environment. In Information Security and Intelligence Control (ISIC), 2012 International conference on (pp. 174-177). IEEE.

10. Z. Sun, J. Shen, and J. M. Yong, “DeDu: Building a deduplication storage system over cloud computing,” in Proc. IEEE Int. Conf. Comput. Supported Cooperative Work Des., 2011, pp. 348–355, doi:10.1109/CSCWD.2011.5960097.

11. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.

12. J. Pettitt, “Hash of plaintext as key?” (2016). [Online]. Available:http://cypherpunks.venona.com/date/1996/02/msg02013.html

13. C. W. Tsai, C. F. Lai, H. C. Chao, and A. V. Vasilakos, “Big data analytics: A survey,” J. Big Data, vol. 2, no. 1, pp. 1–32, 2015, doi:10.1186/s40537-015-0030

14. D. Perttula, B. Warner, and Z. Wilcox-O’Hearn, “Attacks on convergent encryption.” (2016). [Online]. Available: http://bit.ly/yQxyvl.

15. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Proc. Cryptology—EUROCRYPT,2013,pp.296-312.

16. J. Paulo and J. Pereira, “A survey and classification of storage deduplication systems,” ACM Comput. Surveys, vol. 47, no. 1,pp. 1–30, 2014, doi:10.1109/HPCC.2014.134

17. Z. Yan, W. X. Ding, and H. Q. Zhu, “A scheme to manage encrypted data storage with deduplication in cloud,” in Proc.ICA3PP2015, Zhangjiajie, China, Nov. 2015, pp. 547–561.

18. Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Gao, X. Z., & Indragandhi, V. (2017). A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. Future Generation Computer Systems, 83, 653-673.

19. Subramaniyaswamy, V., & Logesh, R. (2017). Adaptive KNN based Recommender System through Mining of User Preferences. Wireless Personal Communications, 97(2), 2229-2247.

20. Logesh, R., & Subramaniyaswamy, V. (2017). A Reliable Point of Interest Recommendation based on Trust Relevancy between Users. Wireless Personal Communications, 97(2), 2751-2780.

21. Logesh, R., & Subramaniyaswamy, V. (2017). Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. Journal of Information Science & Engineering, 33(6), 1629–1647.

22. Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., & Umamakeswari, A. (2017). Sentiment Analysis of Tweets for Estimating Criticality and Security of Events. Journal of Organizational and End User Computing (JOEUC), 29(4), 51-71.

23. Indragandhi, V., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Siarry, P., & Uden, L. (2018). Multi-objective optimization and energy management in renewable based AC/DC microgrid. Computers & Electrical Engineering.

24. Subramaniyaswamy, V., Manogaran, G., Logesh, R., Vijayakumar, V., Chilamkurti, N., Malathi, D., & Senthilselvan, N. (2018). An ontology-driven personalized food recommendation in IoT-based healthcare system. The Journal of Supercomputing, 1-33.

25. Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2018). Hybrid Transform based Adaptive Steganography Scheme using Support Vector Machine for Cloud Storage. Cluster Computing.

26. Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Resources, configurations, and soft computing techniques for power management and control of PV/wind hybrid system. Renewable and Sustainable Energy Reviews, 69, 129-143.

27. Ravi, L., & Vairavasundaram, S. (2016). A collaborative location based travel recommendation system through enhanced rating prediction for the group of users. Computational intelligence and neuroscience, 2016, Article ID: 1291358.

28. Logesh, R., Subramaniyaswamy, V., Malathi, D., Senthilselvan, N., Sasikumar, A., & Saravanan, P. (2017). Dynamic particle swarm optimization for personalized recommender system based on electroencephalography feedback. Biomedical Research, 28(13), 5646-5650.

29. Arunkumar, S., Subramaniyaswamy, V., Karthikeyan, B., Saravanan, P., & Logesh, R. (2018). Meta-data based secret image sharing application for different sized biomedical images. Biomedical Research,29.

30. Vairavasundaram, S., Varadharajan, V., Vairavasundaram, I., & Ravi, L. (2015). Data mining‐based tag recommendation system: an overview. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 5(3), 87-112.

31. Logesh, R., Subramaniyaswamy, V., & Vijayakumar, V. (2018). A personalised travel recommender system utilising social network profile and accurate GPS data. Electronic Government, an International Journal, 14(1), 90-113.

32. Vijayakumar, V., Subramaniyaswamy, V., Logesh, R., & Sivapathi, A. (2018). Effective Knowledge Based Recommeder System for Tailored Multiple Point of Interest Recommendation. International Journal of Web Portals.

33. Subramaniyaswamy, V., Logesh, R., & Indragandhi, V. (2018). Intelligent sports commentary recommendation system for individual cricket players. International Journal of Advanced Intelligence Paradigms, 10(1-2), 103-117.

34. Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Topological review and analysis of DC-DC boost converters. Journal of Engineering Science and Technology, 12 (6), 1541–1567.

35. Saravanan, P., Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2017). Enhanced web caching using bloom filter for local area networks. International Journal of Mechanical Engineering and Technology, 8(8), 211-217.

36. Arunkumar, S., Subramaniyaswamy, V., Devika, R., & Logesh, R. (2017). Generating visually meaningful encrypted image using image splitting technique. International Journal of Mechanical Engineering and Technology, 8(8), 361–368.

37. Subramaniyaswamy, V., Logesh, R., Chandrashekhar, M., Challa, A., & Vijayakumar, V. (2017). A personalised movie recommendation system based on collaborative filtering. International Journal of High Performance Computing and Networking, 10(1-2), 54-63.

38. Senthilselvan, N., Udaya Sree, N., Medini, T., Subhakari Mounika, G., Subramaniyaswamy, V., Sivaramakrishnan, N., & Logesh, R. (2017). Keyword-aware recommender system based on user demographic attributes. International Journal of Mechanical Engineering and Technology, 8(8), 1466-1476.

39. Subramaniyaswamy, V., Logesh, R., Vijayakumar, V., & Indragandhi, V. (2015). Automated Message Filtering System in Online Social Network. Procedia Computer Science, 50, 466-475.

40. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstructured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.

41. Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Intelligent travel recommendation system by mining attributes from community contributed photos. Procedia Computer Science, 50, 447-455.

42. Vairavasundaram, S., & Logesh, R. (2017). Applying Semantic Relations for Automatic Topic Ontology Construction. Developments and Trends in Intelligent Technologies and Smart Systems, 48.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item