Data De-duplication Scheme for File Checksum in Cloud

Data de-duplication is a significant source of security technique in the cloud environment. It accomplishes identical reproductions of the redundant records to save cloud storage. The de-duplication has been used to preserve bandwidth and confidentiality of the user. As de-duplication has many advantages, safety and protection of data is the primary concern as the data of the clients are susceptible to various types of attacks.

[1]  Yonggang Wen,et al.  Private data deduplication protocols in cloud storage , 2012, SAC '12.

[2]  Ethan L. Miller,et al.  The effectiveness of deduplication on virtual machine disk images , 2009, SYSTOR '09.

[3]  Tao Jiang,et al.  Secure and Efficient Cloud Data Deduplication With Randomized Tag , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Le Zhang,et al.  Fast and Secure Laptop Backups with Encrypted De-duplication , 2010, LISA.

[5]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[6]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[7]  Jayashree Agarkhed,et al.  Data storage security algorithms for multi cloud environment , 2016, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).

[8]  Hong Jiang,et al.  SAM: A Semantic-Aware Multi-tiered Source De-duplication Framework for Cloud Backup , 2010, 2010 39th International Conference on Parallel Processing.

[9]  Stéphane Ducasse,et al.  A language independent approach for detecting duplicated code , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).

[10]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[11]  Jianbing Ni,et al.  Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing , 2020, IEEE Transactions on Dependable and Secure Computing.

[12]  Jayashree Agarkhed,et al.  A privacy preservation scheme in cloud environment , 2017, 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).

[13]  Ahmad-Reza Sadeghi,et al.  Twin Clouds: An Architecture for Secure Cloud Computing , 2011 .

[14]  Roberto Di Pietro,et al.  Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.

[15]  Yen-Jen Oyang,et al.  Relevant term suggestion in interactive web search based on contextual information in query session logs , 2003, J. Assoc. Inf. Sci. Technol..

[16]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[17]  Kyung-Hyune Rhee,et al.  Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage , 2018, IEEE Access.

[18]  Patrick P. C. Lee,et al.  RevDedup: a reverse deduplication storage system optimized for reads to latest backups , 2013, APSys.