Skip to main content

Data De-duplication Scheme for File Checksum in Cloud

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 100))

Abstract

Data de-duplication is a significant source of security technique in the cloud environment. It accomplishes identical reproductions of the redundant records to save cloud storage. The de-duplication has been used to preserve bandwidth and confidentiality of the user. As de-duplication has many advantages, safety and protection of data is the primary concern as the data of the clients are susceptible to various types of attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ng CH, Lee PP (2013) Revdedup: a reverse deduplication storage system optimized for reads to latest backups. In: Proceedings of the 4th Asia-Pacific workshop on systems, July 2013. ACM, p 15

    Google Scholar 

  2. Huang CK, Chien LF, Oyang YJ (2003) Relevant term suggestion in interactive web search based on contextual information in query session logs. J Assoc Inf Sci Technol 54(7):638–649

    Article  Google Scholar 

  3. Bugiel S, Nurnberger S, Sadeghi A, Schneider T (2011) Twin clouds: an architecture for secure cloud computing. In: Workshop on cryptography and security in clouds (WCSC 2011), vol 1217889, Mar 2011

    Google Scholar 

  4. Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In: Proceedings of the 27th annual ACM symposium on applied computing, Mar 2012. ACM, pp 441–446

    Google Scholar 

  5. Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security, May 2012. ACM, pp 81–82

    Google Scholar 

  6. Ducasse S, Rieger M, Demeyer S (1999) A language independent approach for detecting duplicated code. In: Proceedings IEEE international conference on software maintenance, 1999 (ICSM’99). IEEE, pp 109–118

    Google Scholar 

  7. Jin K, Miller EL (2009) The effectiveness of deduplication on virtual machine disk images. In: Proceedings of SYSTOR 2009: the Israeli experimental systems conference, May 2009. ACM, p 7

    Google Scholar 

  8. Tan Y, Jiang H, Feng D, Tian L, Yan Z, Zhou G (2010) SAM: a semantic-aware multi-tiered source de-duplication framework for cloud backup. In: 2010 39th international conference on parallel processing (ICPP), Sept 2010. IEEE, pp 614–623

    Google Scholar 

  9. Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. IACR Cryptol ePrint Arch 429

    Google Scholar 

  10. Agarkhed J, Ashalatha R (2017) A privacy preservation scheme in cloud environment. In: 2017 third international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB), Feb 2017. IEEE, pp 549–552

    Google Scholar 

  11. Ashalatha R, Agarkhed J, Patil S (2016) Data storage security algorithms for multi cloud environment. In 2016 2nd international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB), Feb 2016. IEEE, pp 686–690

    Google Scholar 

  12. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques, May 2013. Springer, Berlin, Heidelberg, pp 296–312

    Chapter  Google Scholar 

  13. Anderson P, Zhang L (2010) Fast and secure laptop backups with encrypted de-duplication. In: Proceedings of the 24th international conference on large installation system administration, pp 29–40

    Google Scholar 

  14. Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security, Oct 2011. ACM, pp 491–500

    Google Scholar 

  15. Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Article  Google Scholar 

  16. Ni J, Zhang K, Yu Y, Lin X, Shen XS (2018) Providing task allocation and secure deduplication for mobile crowdsensing via fog computing. IEEE Trans Dependable Secure Comput

    Google Scholar 

  17. Jiang T, Chen X, Wu Q, Ma J, Susilo W, Lou W (2017) Secure and efficient cloud data deduplication with randomized tag. IEEE Trans Inf Forensics Secur 12(3):532–543

    Article  Google Scholar 

  18. Youn TY, Chang KY, Rhee KH, Shin SU (2018) Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access 6:26578–26587

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayashree Agarkhed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agarkhed, J., Deshpande, A., Saraf, A. (2020). Data De-duplication Scheme for File Checksum in Cloud. In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_9

Download citation

Publish with us

Policies and ethics