Abstract
Cloud Data Storage reduces trouble on customers concerning their neighborhood outsourcing data are new issues with respect with data duplicates in the cloud. But some earlier systems deals with the issue of completing an approach to manage handles cloud security and execution with respect to de-duplication by properly applying together in the cloud with record signature recognizing verification methodology using standard Hash based Message Authentication Codes (HMAC). As a result of these hash code counts like SHA-1 and MD5 the record dependability qualities are epic inciting absence of movement variable at the de-duplication estimation. In view of this above issue the limit show obliges prior dependability hash codes inciting execution issues. In this paper, we propose a Genetic Programming approach to manage record deduplication that joins several unmistakable bits of confirmation expelled from the data substance to find a deduplication point of confinement that has the cutoff see whether two segments in a store are copies or not. As showed up by our trials, our procedure beats a present bleeding edge strategy found in the written work. Moreover, the proposed limits are computationally less asking for since they use less affirmation. Moreover, our inherited programming technique is set up to do thusly changing these abilities to a given settled duplicate ID limit, freeing the customer from the heaviness of picking and tune this parameter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, J., Li, Y.K., Chen, X.F., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 99, 1206–1216 (2014)
de Carvalho, G., Laender, A. H.F., Gonc¸alves, M.A., da Silva, A.S.: A genetic programming approach to record deduplication. IEEE Trans. Knowl. Data Eng. 24, 766–770 (2012)
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-bolted encryption and secure deduplication. In: EUROCRYPT, pp. 296–312 (2013)
Bellare, M., Namprempre, C., Neven, G.: Security proofs for character based distinguishing proof and mark plans. J. Cryptol. 22, 1–61 (2009)
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Confirmations of proprietorship in remote stockpiling frameworks. In: ACM Conference on Computer and Communications Security, pp. 491–500. ACM, (2011)
Li, J., Chen, X., Li, M., Li, J., Lee, P., Lou. W.: Secure deduplication with proficient and solid merged key administration. IEEE Trans. Parallel Distrib. Syst. 456–468, (2013)
libcurl. http://curl.haxx.se/libcurl/
Ng, C., Lee, R.P.: A converse deduplication stockpiling framework advanced for peruses to most recent reinforcements. In: Proceedings of APSYS, pp. 74–88 (2013)
Ng, W.K., Wen, Y., Zhu, H.: Private information deduplication conventions in distributed storage. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 441–446. ACM, (2012)
Pietro, R.D., Sorniotti, A: Boosting productivity and security in evidence of proprietorship for deduplication. In: ACM Symposium on Information, Computer and Communications Security, pp. 81–82 (2012)
Quinla. S., Dorward, V.S.,: another way to deal with archiva stockpiling. In: Proceedings of USENIX FAST, pp. 554–568 (2002)
Rahumed, C.H.C.H., Tang, Y., Lee, P.P.C., Lui, J.C.S.: A protected cloud reinforcement framework with guaranteed cancellation and adaptation control. In: Third International Workshop on Security in Cloud Computing, pp. 1704–1712 (2011)
de Carvalho, M.G., Laender, A.H.F.,. Gonc¸alves, M.A., da Silva, A.S.: Copy identification using genetic programming. In: Proceedings of the 23rd Annual ACM Symposium Connected Computing (SAC), pp. 1801–1806 (2008)
Bilenko, M., Mooney, R., Cohen, W., Ravi Kumar, P., Fienberg, S.: Versatile name matching in information integration. IEEE Intell. Syst. 18(5), 16–23 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pandu Ranga Rao, K.V., Krishna Reddy, V., Yakoob, S.K. (2018). Dynamic Secure Deduplication in Cloud Using Genetic Programming. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing, vol 542 . Springer, Singapore. https://doi.org/10.1007/978-981-10-3223-3_48
Download citation
DOI: https://doi.org/10.1007/978-981-10-3223-3_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3222-6
Online ISBN: 978-981-10-3223-3
eBook Packages: EngineeringEngineering (R0)