Security Analysis and Preserving Block-Level Data DE-duplication in Cloud Storage Services
PDF

Keywords

Main memory
memory deduplication
memory segment
virtualization
and execution

How to Cite

Adithya, M., and B. Shanthini. 2020. “Security Analysis and Preserving Block-Level Data DE-Duplication in Cloud Storage Services”. Journal of Trends in Computer Science and Smart Technology 2 (2): 120-26. https://doi.org/10.36548/jtcsst.2020.2.006.

Abstract

Secure information deduplication can altogether decrease the correspondence and capacity overheads in distributed storage benefits and has potential applications in our large information-driven society. Existing information deduplication plans are commonly intended to either oppose savage power assaults or guarantee the effectiveness and information accessibility, yet not the two conditions. We are additionally not mindful of any current plan that accomplishes responsibility, in the feeling of lessening copy data divulgence (e.g., to decide if plain-writings of two scrambled messages are indistinguishable). Right now, examine the three-level cross-space design and propose an effective and protection safeguarding huge information deduplication in distributed storage (from now on alluded to as EPCDD). EPCDD accomplishes both protection safeguarding and information accessibility and opposes beast power assaults. Plus, we consider the responsibility to offer preferable protection affirmations over existing plans. We at that point show that EPCDD beats existing contending plans, as far as calculation, correspondence, and capacity overheads. Additionally, the time unpredictability of copy search in EPCDD is logarithmic.

PDF

References

Fei Xu, Fangming Liu, Hai Jin, V. Vasilakos. Overhead of Virtual Machines in Cloud Computing: A Survey, State of the Art, and Future Directions. Proceedings of the IEEE, pages 11-31, Jan. 2016.

Amazon.com, Customer success. Powered by the AWS Cloud.[Online]. Available: http://aws.amazon.com/solutions/case-studies/

E.Baraneetharan, G. Selvakumar, “Smart Internet of Things (IOT) System for Perfor-mance Improvement of Dual Bridge LLC Resonant Converter by Using Sophisticated Distribution Control Method (SDC)” in Proc. IoT close loop, 2018, Springer.

Amazon.com, Amazon elastic compute cloud (Amazon EC2) .[Online]. Available: http://aws.amazon.com/ec2/

J. F. Gantz, S. Minton, and A. Toncheva, Cloud computings role in job creation, Mar. 2017.[Online]. Available: http://www.microsoft.com/en- us/news/features/2017/mar12/03-05cloudcomputingjobs.aspx

R. P. Goldberg. Survey of virtual machine research. Computer, 7(9):34C45, Sept. 2017.

M. Rosenblum and T. Garfinkel. Virtual machine monitors: current technology and future trends.Computer, 38(5):39C47, 2016.

L. Chen, Z. Wei, Z. Cui, M. Chen, H. Pan, Y. Bao. CMD: classification- based memory deduplication through page access characteristics. In VEE14, 2014.

A. Arcangeli, I. Eidus, and C. Wright. Increasing memory density by using ksm. InPro-ceedings of the Linux Symposium (OLS09), pages 19C28, 2015.

D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren, G. Varghese, G. M. Voelker, and A. Vahdat. Difference engine: harnessing memory redundancy in virtual machines. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI08, pages 309C322, 2015.

C. A. Waldspurger. Memory resource management in vmware esx server. SIGOPS Oper. Syst. Rev., 36(SI):181C194, Dec. 2016.