Abstract
Data de-duplication is a significant source of security technique in the cloud environment. It accomplishes identical reproductions of the redundant records to save cloud storage. The de-duplication has been used to preserve bandwidth and confidentiality of the user. As de-duplication has many advantages, safety and protection of data is the primary concern as the data of the clients are susceptible to various types of attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ng CH, Lee PP (2013) Revdedup: a reverse deduplication storage system optimized for reads to latest backups. In: Proceedings of the 4th Asia-Pacific workshop on systems, July 2013. ACM, p 15
Huang CK, Chien LF, Oyang YJ (2003) Relevant term suggestion in interactive web search based on contextual information in query session logs. J Assoc Inf Sci Technol 54(7):638–649
Bugiel S, Nurnberger S, Sadeghi A, Schneider T (2011) Twin clouds: an architecture for secure cloud computing. In: Workshop on cryptography and security in clouds (WCSC 2011), vol 1217889, Mar 2011
Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In: Proceedings of the 27th annual ACM symposium on applied computing, Mar 2012. ACM, pp 441–446
Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security, May 2012. ACM, pp 81–82
Ducasse S, Rieger M, Demeyer S (1999) A language independent approach for detecting duplicated code. In: Proceedings IEEE international conference on software maintenance, 1999 (ICSM’99). IEEE, pp 109–118
Jin K, Miller EL (2009) The effectiveness of deduplication on virtual machine disk images. In: Proceedings of SYSTOR 2009: the Israeli experimental systems conference, May 2009. ACM, p 7
Tan Y, Jiang H, Feng D, Tian L, Yan Z, Zhou G (2010) SAM: a semantic-aware multi-tiered source de-duplication framework for cloud backup. In: 2010 39th international conference on parallel processing (ICPP), Sept 2010. IEEE, pp 614–623
Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. IACR Cryptol ePrint Arch 429
Agarkhed J, Ashalatha R (2017) A privacy preservation scheme in cloud environment. In: 2017 third international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB), Feb 2017. IEEE, pp 549–552
Ashalatha R, Agarkhed J, Patil S (2016) Data storage security algorithms for multi cloud environment. In 2016 2nd international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB), Feb 2016. IEEE, pp 686–690
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques, May 2013. Springer, Berlin, Heidelberg, pp 296–312
Anderson P, Zhang L (2010) Fast and secure laptop backups with encrypted de-duplication. In: Proceedings of the 24th international conference on large installation system administration, pp 29–40
Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security, Oct 2011. ACM, pp 491–500
Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625
Ni J, Zhang K, Yu Y, Lin X, Shen XS (2018) Providing task allocation and secure deduplication for mobile crowdsensing via fog computing. IEEE Trans Dependable Secure Comput
Jiang T, Chen X, Wu Q, Ma J, Susilo W, Lou W (2017) Secure and efficient cloud data deduplication with randomized tag. IEEE Trans Inf Forensics Secur 12(3):532–543
Youn TY, Chang KY, Rhee KH, Shin SU (2018) Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access 6:26578–26587
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agarkhed, J., Deshpande, A., Saraf, A. (2020). Data De-duplication Scheme for File Checksum in Cloud. In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_9
Download citation
DOI: https://doi.org/10.1007/978-981-15-2071-6_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2070-9
Online ISBN: 978-981-15-2071-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)