Abstract

Cloud service providers providing users with efficient and effective storage and transmission of data. To reduce storage costs and save bandwidth, cloud service providers are attracted to use data de-duplication feature. Cloud users are interested in using the cloud safely and privately to protect the data they share on the cloud. Therefore, they encrypt the data before uploading it to the cloud. Since the intent of encryption conflicts with the de-duplication function, the data de-duplication feature becomes a hard problem. Existing de-duplication methods are ineffective in terms of both security and efficiency. They are either vulnerable to brute force attacks that enable the attacker to retrieve files, or they are computationally expensive. That is what drives us to suggest a method for removing duplicate data that is both performance and security effective. We'll start with a description of the implementations and functionality of de-duplication strategies, then move on to the literature that proposes various approaches to de-duplication and the security and efficiency problems that existing approaches face. Via the use of the AES-CBC algorithm and hashing functions, we have proposed an enhancement to improves the performance and protection of data de-duplication for users. Without the involvement of a third party, users' keys are created in a consistent and safe manner. We prove the efficacy of the recommended solution by putting it into practice and comparison with the existing techniques.

Highlights

  • 1.1 OverviewThis decade has seen significant advancements in technology, and has provided many opportunities to both businesses and individuals

  • We provided a literatures in this paper that discussed various approaches to deduplicate data

  • We've outlined the problems with the de-duplication application's success as well as security concerns

Read more

Summary

Overview

This decade has seen significant advancements in technology, and has provided many opportunities to both businesses and individuals. The service provider uses data duplication removal as it allows storing one copy of the file and eliminating duplicates to manage the services provided by the cloud, increase the effectiveness of performance, reduce storage space as much as possible, and reduce bandwidth. Cloud service providers use de-duplication technologies to store only a single copy of their content, reduce storage space ,and increase efficiency, but we must consider the security concerns that de-duplicate data creates. This paper[45] suggests Cloudedup is effective and achieves the goal of eliminating duplicate data and provides secure block-level storage This approach relies on convergent encryption which is a solution to the problem of traditional encryption conflicts with eliminating duplicate of data. The adversary may deduce the target message if one of the computed ciphertexts matches the ciphertext of the target message[64]

Single-Server Cross-User De-duplication
Symmetric or asymmetric encryption
Development
Performance evaluation
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call