A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Buchade, Amar
- Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System
Authors
1 Department of Computer Engineering, Pune Institute of Computer Technology, Pune, IN
2 Department of Computer Engineering, Pune Institute of Computer Technology, Pune, IN
Source
Networking and Communication Engineering, Vol 7, No 8 (2015), Pagination: 317-320Abstract
Nowadays, cloud based storage services offer easy to access, secure, reliable, and low cost remote storage for file sharing, document suits and online backups. The leading cloud based storage services use data deduplication as the continuous and exponential increase of number of users and size of their data. Data deduplication removes redundant data and tries to ensure that only unique instance of the data is stored. The purpose of deduplication are to reduce the network bandwidth, to reduce storage space, to check user instances have original content, to reduce total cost of ownership and improves backup operation and reduce Recovery Time Objective. Here, in this paper, we are combining both file level data deduplication and chunk level data deduplication to achieve faster deduplication at client side deduplication. To reduce the index overhead we are using application aware index structure method. In order to give security with deduplication convergent encryption is applied. As for chunk level deduplication with encryption, key management issue arises. To solve key management issue we effectively use the metadata manager component. At cloud storage side the cross user data deduplication is done securely.
Keywords
Application Awareness, Cloud Storage, Convergent Encryption, Data Deduplication, Source Deduplication.- Group Policy based Self-Destruction Data System
Authors
1 Department of Computer Technology, Savitribai Phule Pune University, Pune, IN
2 Department of Computer Technology in Pune Institute of Computer Technology, Savitribai Phule Pune University, Pune, IN
Source
Networking and Communication Engineering, Vol 7, No 7 (2015), Pagination: 293-297Abstract
Recently, large amount of data is being created every day so people are looking towards new way of storing and processing data. In corporate world every organization, industries or any company needs large capacity of storage to store huge data in low cost. Mostly users store very sensitive and confidential information/data on storage system through network. The sensitive information contains business data, passwords, banking information, information related to finance and user’s secret notes etc. The sensitive data store on storage system for long time generates issue regarding privacy. In proposed system, we provide privacy of data using key sharing algorithm and access control mechanism. We use self-data destruction to destruct data and key from storage after user specified duration. The parameters considered are minimizing the time required to setup the key for cryptographic process and minimize time for uploading and downloading operation time of data.Keywords
Data Privacy, Self-Destructing Data, Dynamic Environment, Information Security, Distributed System.- An Approach for Scaling Resources for Applications in Cloud
Authors
1 Department of Computer Technology, Savitribai Phule Pune University, Pune, IN
2 Department of Computer Technology in Pune Institute of Computer Technology, Savitribai Phule Pune University, Pune, IN