Designing Multi-Cloud Security Model Using Encryption and Replication

Authors

  • Sunny G. Gandhi  Department of IT, Datta Meghe Institute of Engineering Technology & Research, Wardha, Maharastra, India
  • Nandini B. Wasnik  
  • Harshal G. Katait  

Keywords:

Deduplication, distributed storage system, reliability, secret sharing

Abstract

With the unstable development of computerized information, de-duplication procedures are generally utilized to reinforcement information and minimize system and capacity overhead by recognizing and taking out excess among information. Rather than keeping various information duplicates with the same substance, de-duplication takes out repetitive information by keeping stand out physical duplicate and alluding other excess information to that duplicate. De-duplication has gotten much consideration from both the scholarly world and industry in light of the fact that it can significantly enhances stockpiling usage and spare storage room, particularly for the applications with high de-duplication proportion, for example, archival capacity frameworks. Various de-duplication frameworks have been proposed taking into account different de-duplication methodologies, for example, customer side or server-side de-duplications, record level or square level de-duplications. Particularly, with the approach of distributed storage, information de-duplication systems turn out to be more alluring and discriminating for the administration of always expanding volumes of information in distributed storage administrations which inspires endeavors and associations to outsource information stockpiling.

References

  1. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615-1625.
  2. Li, C. Qin, P. P. C. Lee, and J. Li, “Convergent dispersal: Toward storage-efficient security in a cloud-of-clouds,” in The 6th USENIX Workshop on Hot Topics in Storage and File Systems, 2014.
  3. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in USENIX SecuritySymposium, 2013.
  4. Xu, E.-C. Chang, and J. Zhou, “Weak leakage-resilient client-side duplication of encrypted data in cloud storage,” in ASIACCS, 2013, pp. 195-206.
  5. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: Deduplication in cloud storage.” IEEE Security & Privacy, vol. 8, no. 6, pp. 40-47, 2010.
  6. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,” in 3rd International Workshop on Security in Cloud Computing, 2011.
  7. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,” in 3rd International Workshop on Security in Cloud Computing, 2011.
  8. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems.” in ACM Conference on Computer and Communications Security, &. Cheng. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491-500.
  9. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: Deduplication in cloud storage.” IEEE Security & Privacy, vol. 8, no. 6, pp. 40-47, 2010.
  10. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. of USENIX LISA, 2010.
  11. Shacham and B. Waters, “Compact proofs of retrievability,” in ASIACRYPT, 2008, pp. 90-107.
  12. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS ’07. New York, NY, USA:
  13. Wilcox-O’Hearn and B. Warner, “Tahoe: the least-authority filesystem,” in Proc. of ACM StorageSS, 2008.
  14. S. Plank, S. Simmerman, and C. D. Schuman, “Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2,” University of Tennessee, Tech. Rep. CS-08-627, August 2008
  15. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system.” in ICDCS, 2002, pp. 617-624.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Sunny G. Gandhi, Nandini B. Wasnik, Harshal G. Katait, " Designing Multi-Cloud Security Model Using Encryption and Replication, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.1595-1599, January-February-2018.