Multi-Cloud Security Model using Encryption and Replication : A Review
Keywords:
Deduplication, Distributed Storage System, Reliability, Secret SharingAbstract
With the unstable development of computerized information, de-duplication procedures are generally utilized to reinforcement information and minimize system and capacity overhead by recognizing and taking out excess among information. Rather than keeping various information duplicates with the same substance, de-duplication takes out repetitive information by keeping stand out physical duplicate and alluding other excess information to that duplicate. De-duplication has gotten much consideration from both the scholarly world and industry in light of the fact that it can significantly enhances stockpiling usage and spare storage room, particularly for the applications with high de-duplication proportion, for example, archival capacity frameworks. Various de-duplication frameworks have been proposed taking into account different de-duplication methodologies, for example, customer side or server-side de-duplications, record level or square level de-duplications. Particularly, with the approach of distributed storage, information de-duplication systems turn out to be more alluring and discriminating for the administration of always expanding volumes of information in distributed storage administrations which inspires endeavors and associations to outsource information stockpiling.
References
- Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615-1625.
- Li, C. Qin, P. P. C. Lee, and J. Li, “Convergent dispersal: Toward storage-efficient security in a cloud-of-clouds,” in The 6th USENIX Workshop on Hot Topics in Storage and File Systems, 2014.
- Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in USENIX SecuritySymposium, 2013.
- Xu, E.-C. Chang, and J. Zhou, “Weak leakage-resilient client-side duplication of encrypted data in cloud storage,” in ASIACCS, 2013, pp. 195-206.
- Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: Deduplication in cloud storage.” IEEE Security & Privacy, vol. 8, no. 6, pp. 40-47, 2010.
- Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,” in 3rd International Workshop on Security in Cloud Computing, 2011.
- Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,” in 3rd International Workshop on Security in Cloud Computing, 2011.
- Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems.” in ACM Conference on Computer and Communications Security, &. Cheng. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491-500.
- Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: Deduplication in cloud storage.” IEEE Security & Privacy, vol. 8, no. 6, pp. 40-47, 2010.
- Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. of USENIX LISA, 2010.
- Shacham and B. Waters, “Compact proofs of retrievability,” in ASIACRYPT, 2008, pp. 90-107.
- Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS ’07. New York, NY, USA:
- Wilcox-O’Hearn and B. Warner, “Tahoe: the least-authority filesystem,” in Proc. of ACM StorageSS, 2008.
- S. Plank, S. Simmerman, and C. D. Schuman, “Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2,” University of Tennessee, Tech. Rep. CS-08-627, August 2008
- R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system.” in ICDCS, 2002, pp. 617-624.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.