Data De-duplication Scheme for File Checksum in Cloud

  • Jayashree AgarkhedEmail author
  • Apurva Deshpande
  • Ankita Saraf
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 100)


Data de-duplication is a significant source of security technique in the cloud environment. It accomplishes identical reproductions of the redundant records to save cloud storage. The de-duplication has been used to preserve bandwidth and confidentiality of the user. As de-duplication has many advantages, safety and protection of data is the primary concern as the data of the clients are susceptible to various types of attacks.


Cloud computing Duplication Checksum Secure hashing algorithm 


  1. 1.
    Ng CH, Lee PP (2013) Revdedup: a reverse deduplication storage system optimized for reads to latest backups. In: Proceedings of the 4th Asia-Pacific workshop on systems, July 2013. ACM, p 15Google Scholar
  2. 2.
    Huang CK, Chien LF, Oyang YJ (2003) Relevant term suggestion in interactive web search based on contextual information in query session logs. J Assoc Inf Sci Technol 54(7):638–649CrossRefGoogle Scholar
  3. 3.
    Bugiel S, Nurnberger S, Sadeghi A, Schneider T (2011) Twin clouds: an architecture for secure cloud computing. In: Workshop on cryptography and security in clouds (WCSC 2011), vol 1217889, Mar 2011Google Scholar
  4. 4.
    Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In: Proceedings of the 27th annual ACM symposium on applied computing, Mar 2012. ACM, pp 441–446Google Scholar
  5. 5.
    Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security, May 2012. ACM, pp 81–82Google Scholar
  6. 6.
    Ducasse S, Rieger M, Demeyer S (1999) A language independent approach for detecting duplicated code. In: Proceedings IEEE international conference on software maintenance, 1999 (ICSM’99). IEEE, pp 109–118Google Scholar
  7. 7.
    Jin K, Miller EL (2009) The effectiveness of deduplication on virtual machine disk images. In: Proceedings of SYSTOR 2009: the Israeli experimental systems conference, May 2009. ACM, p 7Google Scholar
  8. 8.
    Tan Y, Jiang H, Feng D, Tian L, Yan Z, Zhou G (2010) SAM: a semantic-aware multi-tiered source de-duplication framework for cloud backup. In: 2010 39th international conference on parallel processing (ICPP), Sept 2010. IEEE, pp 614–623Google Scholar
  9. 9.
    Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. IACR Cryptol ePrint Arch 429Google Scholar
  10. 10.
    Agarkhed J, Ashalatha R (2017) A privacy preservation scheme in cloud environment. In: 2017 third international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB), Feb 2017. IEEE, pp 549–552Google Scholar
  11. 11.
    Ashalatha R, Agarkhed J, Patil S (2016) Data storage security algorithms for multi cloud environment. In 2016 2nd international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB), Feb 2016. IEEE, pp 686–690Google Scholar
  12. 12.
    Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques, May 2013. Springer, Berlin, Heidelberg, pp 296–312CrossRefGoogle Scholar
  13. 13.
    Anderson P, Zhang L (2010) Fast and secure laptop backups with encrypted de-duplication. In: Proceedings of the 24th international conference on large installation system administration, pp 29–40Google Scholar
  14. 14.
    Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security, Oct 2011. ACM, pp 491–500Google Scholar
  15. 15.
    Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625CrossRefGoogle Scholar
  16. 16.
    Ni J, Zhang K, Yu Y, Lin X, Shen XS (2018) Providing task allocation and secure deduplication for mobile crowdsensing via fog computing. IEEE Trans Dependable Secure ComputGoogle Scholar
  17. 17.
    Jiang T, Chen X, Wu Q, Ma J, Susilo W, Lou W (2017) Secure and efficient cloud data deduplication with randomized tag. IEEE Trans Inf Forensics Secur 12(3):532–543CrossRefGoogle Scholar
  18. 18.
    Youn TY, Chang KY, Rhee KH, Shin SU (2018) Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access 6:26578–26587CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Jayashree Agarkhed
    • 1
    Email author
  • Apurva Deshpande
    • 1
  • Ankita Saraf
    • 1
  1. 1.P.D.A College of EngineeringKalaburagiIndia

Personalised recommendations