Secure Data Deduplication System with Tag Consistency in Cloud Data Storage

Cloud computing technique is most generally used technique nowadays, in that clouding up is completed over giant communication network. And provides massive space for storing in all sectors like administrative unit, private enterprises, etc. Additionally stores personal information on cloud, but the foremost necessary drawback in cloud is that giant quantity of space for storing is needed and conjointly duplicate copies of knowledge is store on cloud. There is a unit of several techniques that is employed for preventing duplicate copies of continuation information. The necessary technique is data deduplication, Data Deduplication is specializes data compression techniques for removing duplicate copies of repeated data and has been widely utilized in cloud storage to reduce the quantity of space for storing. To safeguard the confidentiality of sensitive data on cloud, the confluent encryption technique is utilized to cipher the data before storing it on cloud. In projected system we have used Shamir Secrete sharing algorithm.

[1]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[3]  Alessandro Sorniotti,et al.  A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.

[4]  Patrick P. C. Lee,et al.  RevDedup: a reverse deduplication storage system optimized for reads to latest backups , 2013, APSys.

[5]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[6]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[7]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[8]  Shucheng Yu,et al.  Secure and constant cost public cloud storage auditing with deduplication , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[9]  Sean Quinlan,et al.  Venti: A New Approach to Archival Storage , 2002, FAST.