Main Article Content
- Distributed computing gives another method for administration by offering different assets over Internet. One of the essential administrations given by cloud benefit is information stockpiling. So as to save the protection of clients, these information are put away in cloud in a scrambled shape. Deduplication ends up critical and a testing errand when the information is put away in scrambled shape, which additionally prompts intricacy in putting away extensive information and handling in cloud. A customary deduplication strategy does not take a shot at scrambled information. Existing arrangements accessible for deduplicating encoded information has different security issues. They doesn't give get to control and repudiation as far as capacity. Thus, the deduplication plans are not for the most part conveyed practically speaking. In this paper, we propose a system to deduplicate encoded information put away in cloud dependent on access control along these lines evading repetitive capacity. It coordinates cloud information deduplication with access control. The aftereffect of our plan demonstrates prevalent proficiency and has potential for functional arrangement on account of enormous information stockpiling.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
A secure data deduplication framework for cloud environments, authors: Fatema Rashid, Ali Miri, Isaac Woungang
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud, authors: Hui Cui, Robert H. Deng, Yingjiu Li
Achieving lightweight, time-specific and secure access control in cloud storage, authors: Yanchao Wang,Fenghua Li, Ben Niu
Design and implementation of various file deduplication schemes on storage devices, authors: Yong-Ting Wu , MinChieh Yu , Jenq-Shiou Leu , Eau-Chung Lee,TianSong
T. T. Wu, W. C. Dou, C. H. Hu, and J. J. Chen, “Service mining for trusted service composition in cross-cloud environment,” IEEE Systems Syst. J., vol. PP, no. 99, pp. 1–12, 2014, doi:10.1109/ JSYST.2014.2361841.
Liu, C. Yang, X. Y. Zhang, and J. J. Chen, “External integrity verification for outsourced big data in cloud and iot: A big picture,” Future Generation Comput. Syst., vol. 49, pp. 58–67, 2015
W. Tsai, C. F. Lai, H. C. Chao, and A. V. Vasilakos, “Big data analytics: A survey,” J. Big Data, vol. 2, no. 1, pp. 1–32, 2015, doi:10.1186/s40537-015-0030-3.
L. F. Wei, et al., “Security and privacy for storage and computation in cloud computing,” Inf. Sci., vol. 258, pp. 371– 386, 2014, doi:10.1016/j.ins.2013.04.028.
“Deduplication on Encrypted Big Data in Cloud” by Zheng Yan, Senior Member, IEEE, Wenxiu Ding, Xixun Yu, Haiqi Zhu, and Robert H. Deng, Fellow, IEEE .
M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: Opportunities and challenges,” Inf. Sci., vol. 305, pp. 357– 383, 2015, doi:10.1016/j.ins.2015.01.025.