ABSTRACT
Data Deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable deduplication system.
Keyword: Secure, Deduplication, System, eliminating, Cloud, Privacy
[1]. Anderson,P., Zhang, L (2010)” Fast And Secure Laptop Backup With Encrypted De-duplication” In Proceeding Of USENIX LISA.
[2]. Attenise, C., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., song, D(2007)” Provable Data Possession At Untrusted Stores” In Proceeding Of The 14th ACM Conference On Computer And Communication security,pp.598-609.
[3]. Bellare, M., Keelveedhi, S., and Ristenpart, T (2013) ” Dupless: Server- Aided Encryption For Deduplicated Storage” In Proceeding Of USENIX Security Symposium.
[4].Halevi,S., Harnik,D., Pinkas,B., and Shulman-Peleg,A (2011)” Proofs Of Ownership In Remote Storage systems”In ACM Conference On computer And Communications security,pp.491-500.
[5]. Li,j., Chen,X., Li,M., Li,J., Lee,P., Lou,W.,(2014)”Secure Deduplication With Efficient And Reliable Convergent Key Management “In IEEE Transaction On Parallel And Distributed Systems,pp.1615-1625.
[6]. Li,M.,Qin,C.,Lee,P,P,C., and Li,J., (2014)”Convergent Dispersal: Toward Storage-Efficient In a Cloud Of Clouds” In the 6th USENIX Workshop on Hot Topics In Storage And File Systems.
[7]. Ng, W,k., Wen,Y.,Zha,H. (2012)” Private Data Deduplication Protocols In Cloud storage” In Proceedings Of The 27th Annual ACM Symposium On Applied Computing,pp.441-446.
[8]. Plank,J,S., Simmerman,S., Schuman,C,D (2008) ” Jerasure: A Library in C/C++ Facilitating Erasure Coding For Storage Applications”.
[9]. Plank,J,S.,Xu,L.,(2006)”Optimizing Cauchy Reed-Solomon Codes For Fault-Tolerant Network Storage Applications In 5th IEEE International Symposium On Network Computing Application.
[10]. Rahumed,A., Chen,H.C.H., Tang,Y., Lee,P.P.C., and Lui,J.C.S.(2011)“A Secure Cloud Backup System With Assured Deletion”.