The Identical Data in Cloud Storage with ADJDUP Technique
PDF
PDF

How to Cite

Pandit, Anubhav. 2021. “The Identical Data in Cloud Storage With ADJDUP Technique”. Journal of Ubiquitous Computing and Communication Technologies 2 (4): 214-18. https://doi.org/10.36548/jucct.2020.4.004.

Keywords

— data compression
— information systems
— cloud computing
— encryption
— secure storage
Published: 06-01-2021

Abstract

Data deduplication is necessary for corporations to minimize the hidden charges linked with backing up their data using Public Cloud platform. Incapable data storage on its own can become improvident, and such problem are enlarging in the Public Cloud at other and scattered satisfied confirmed storage structure are creating multiple clone of single account for collating or other purposes. Deduplication is friendly in cost shrinking by lengthening the benefit of a precise volume of data. Miserably, data duplicity having several safety constraints, so more than one encoding is appropriate to validate the details. There is a system for dynamic Information-Locking and Encoding with Convergent Encoding. In this Information-Locking and Encoding with Convergent Encoding, the data is coded first and then the cipher text is encoded once more. Chunk volume is used for deduplication to diminish disk capacity. The same segments would still be encrypted in the same cipher message. The format of the key neither be abbreviated from encrypted chunk data by the hacker. The comprehension is also guarded from the cloud server. The center of attention of this document is to reducing disk storage and provides protection for online cloud deduplication.

References

  1. D. Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress Publishing / Elsevier, 2014.[Online]. Available: http://www.elsevier.com/books/cloud-storageforensics/ quick/978-0-12-419970-5
  2. K. R. Choo, J. Domingo-Ferrer, and L. Zhang, Cloud cryptography: Theory, practice and future research directions,Future Generation Comp. Syst., vol. 62, pp. 51–53, 2016.
  3. K. R. Choo, M. Herman, M. Iorga, and B. Martini, Cloud forensics: State-of-the-art and future directions, Digital Investigation, vol. 18, pp. 77–78, 2016.
  4. Y. Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo, Cloud based data sharing with fine-grained proxy re-encryption, Pervasive and Mobile Computing, vol. 28, pp. 122–134, 2016.
  5. D. Quick and K. R. Choo, Google drive: Forensic analysis of data remnants,J. Network and Computer Applications, vol. 40, pp. 179– 193, 2014.
  6. A. Sahai and B. Waters, Fuzzy identity-based encryption,in Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3494. Springer, 2005, pp. 457–473.
  7. B. Zhu, K. Li, and R. H. Patterson,Avoiding the disk bottleneck in the data domain deduplication file system, in 6th USENIX Conference on File and Storage Technologies, FAST 2008, February 26- 29, 2008, San Jose, CA, USA. USENIX, 2008, pp. 269–282.
  8. M. Bellare, S. Keelveedhi, and T. Ristenpart,Message-locked encryption and secure deduplication, in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, ser. Lecture Notes in Computer Science, vol. 7881. Springer, 2013, pp. 296–312.
  9. M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, Message-locked encryption for lock-dependent messages,in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, ser. Lecture Notes in Computer Science, vol. 8042. Springer, 2013, pp. 374–391.
  10. S. Keelveedhi, M. Bellare, and T. Ristenpart,Dupless: Serveraided encryption for deduplicated storage, in Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013. USENIX Association, 2013, pp. 179–194.
  11. S. Bugiel, S. N¨ urnberger, A. Sadeghi, and T. Schneider,Twin clouds: Secure cloud computing with low latency - (full version),in Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium,