Number 10

One very important challenges of today’s cloud storage services is that the management of the ever-increasing amount of data. To create data management scalable, de-duplication has been a widely known technique to condense space for storing and transfer information measure in cloud storage. Rather than keeping multiple data copies with an equivalent content, de-duplication eliminates redundant data by keeping just one physical copy and referring different redundant data to it copy. Convergent Encryption, additionally called content hash keying, could be a cryptosystem that produces identical ciphertext from identical plaintext files. Data de-duplication could be a technique for eliminating duplicate copies of data, and has been wide employed in cloud storage to scale back space for storing and transfer information measure. Promising because it is, associate degree arising challenge is to perform secure de-duplication in cloud storage. Currently daily the foremost arising challenge is to perform secure de-duplication in cloud storage. Though Convergent Encryption has been extensively adopted for secure de-duplication, a essential issue of creating Convergent Encryption sensible is to with efficiency and dependably manage a large range of convergent keys. we have a

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Alfredo De Santis,et al.  Multiple ramp schemes , 1999, IEEE Trans. Inf. Theory.

[3]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[4]  Yongdae Kim,et al.  On protecting integrity and confidentiality of cryptographic file system for outsourced storage , 2009, CCSW '09.

[5]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[6]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[7]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[8]  Edgar R. Weippl,et al.  Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space , 2011, USENIX Security Symposium.

[9]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[10]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[11]  John Gantz,et al.  The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .

[12]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[13]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[14]  Mr. R. NavinKumar,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2018 .