Reddy et al., 2021 - Google Patents

Secure Updatable Data Deduplication in Cloud.

Reddy et al., 2021

Document ID
2447075872101244825
Author
Reddy B
Priya K
Sri G
Nikitha P
Samvidha A
Publication year
Publication venue
Grenze International Journal of Engineering & Technology (GIJET)

External Links

Snippet

With the constant usage of Storage techniques in daily lives, it has been important to establish a system which properly manages the storage space. Almost all the storage space of cloud is occupied by the duplicate data which have been gathered or downloaded from …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30156De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Rahumed et al. A secure cloud backup system with assured deletion and version control
US9336092B1 (en) Secure data deduplication
Yan et al. A scheme to manage encrypted data storage with deduplication in cloud
US10152487B1 (en) System and method for a cloud storage provider to safely deduplicate encrypted backup objects
CN109995505A (en) A kind of mist calculates data safety machining system and method, cloud storage platform under environment
Almrezeq ‏ An Enhanced Approach to Improve the Security and Performance for Deduplication
Periasamy et al. An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment
Periasamy et al. Efficient hash function–based duplication detection algorithm for data Deduplication deduction and reduction
Wang et al. A policy-based deduplication mechanism for securing cloud storage
Geeta et al. SDVADC: secure deduplication and virtual auditing of data in cloud
Ebinazer et al. An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment
Pawar et al. Providing security and integrity for data stored in cloud storage
Reddy et al. Secure Updatable Data Deduplication in Cloud.
Tian et al. Sed‐Dedup: An efficient secure deduplication system with data modifications
Banala et al. Performance of Secure Data Deduplication Framework in Cloud Services
Shaikh et al. Achieving secure deduplication by using private cloud and public cloud
Koo et al. Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage
Reddy et al. Performance evaluation of various data deduplication schemes in cloud storage
Reddy et al. Secure Data Deduplication by Using Convergent Key
Aldar et al. A survey on secure deduplication of data in cloud storage
Ebinazer et al. PoI: Proof of Identity and PoDI: Proof of Data Integrity for Secure Data Deduplication in the Cloud
Kim et al. Overview of Data Deduplication Technology in a Cloud Storage Environment
Feng Secure Deduplication
Bhavya et al. Improving Storage Efficiency with Multi-cluster Deduplication and Achieving High-Data Availability in Cloud
Indira et al. Cloud secure distributed storage deduplication scheme for encrypted data