Abstract

Along with the arrival of the age of big data, lots of data processing must rely on distributed processing of cloud computing, and the amount of data stored in the cloud is sharply increasing. Therefore, the management of massive data has become a noticeable challenge. One of the crucial challenges is how to delete the duplicate data while ensuring data privacy, wherefore the secure deduplication techniques appeared on the scene. In this paper, we first present three different mainstream secure deduplication strategies, convergent encryption, proof of ownership and twin data centre architecture, and make a brief description of their work process. Some variants on top of the three strategies which extend their functions or remedy old deficiencies and analysis of their own performance efficiency or their advantages and disadvantages are given. This paper also includes some state-of-the-art deduplication systems which are not based on the three above-mentioned strategies such as DupLESS, etc. They provide some new design ideas about secure deduplication in cloud data centre and may inspire people to design a better system.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call