Skip to main content

Dynamic Secure Deduplication in Cloud Using Genetic Programming

  • Conference paper
  • First Online:
Book cover Data Engineering and Intelligent Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 542 ))

Abstract

Cloud Data Storage reduces trouble on customers concerning their neighborhood outsourcing data are new issues with respect with data duplicates in the cloud. But some earlier systems deals with the issue of completing an approach to manage handles cloud security and execution with respect to de-duplication by properly applying together in the cloud with record signature recognizing verification methodology using standard Hash based Message Authentication Codes (HMAC). As a result of these hash code counts like SHA-1 and MD5 the record dependability qualities are epic inciting absence of movement variable at the de-duplication estimation. In view of this above issue the limit show obliges prior dependability hash codes inciting execution issues. In this paper, we propose a Genetic Programming approach to manage record deduplication that joins several unmistakable bits of confirmation expelled from the data substance to find a deduplication point of confinement that has the cutoff see whether two segments in a store are copies or not. As showed up by our trials, our procedure beats a present bleeding edge strategy found in the written work. Moreover, the proposed limits are computationally less asking for since they use less affirmation. Moreover, our inherited programming technique is set up to do thusly changing these abilities to a given settled duplicate ID limit, freeing the customer from the heaviness of picking and tune this parameter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, J., Li, Y.K., Chen, X.F., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 99, 1206–1216 (2014)

    Google Scholar 

  2. de Carvalho, G., Laender, A. H.F., Gonc¸alves, M.A., da Silva, A.S.: A genetic programming approach to record deduplication. IEEE Trans. Knowl. Data Eng. 24, 766–770 (2012)

    Google Scholar 

  3. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-bolted encryption and secure deduplication. In: EUROCRYPT, pp. 296–312 (2013)

    Google Scholar 

  4. Bellare, M., Namprempre, C., Neven, G.: Security proofs for character based distinguishing proof and mark plans. J. Cryptol. 22, 1–61 (2009)

    Article  MATH  Google Scholar 

  5. http://www.peazip.org/copieshash-checksum.html

  6. Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Confirmations of proprietorship in remote stockpiling frameworks. In: ACM Conference on Computer and Communications Security, pp. 491–500. ACM, (2011)

    Google Scholar 

  7. Li, J., Chen, X., Li, M., Li, J., Lee, P., Lou. W.: Secure deduplication with proficient and solid merged key administration. IEEE Trans. Parallel Distrib. Syst. 456–468, (2013)

    Google Scholar 

  8. libcurl. http://curl.haxx.se/libcurl/

  9. Ng, C., Lee, R.P.: A converse deduplication stockpiling framework advanced for peruses to most recent reinforcements. In: Proceedings of APSYS, pp. 74–88 (2013)

    Google Scholar 

  10. Ng, W.K., Wen, Y., Zhu, H.: Private information deduplication conventions in distributed storage. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 441–446. ACM, (2012)

    Google Scholar 

  11. Pietro, R.D., Sorniotti, A: Boosting productivity and security in evidence of proprietorship for deduplication. In: ACM Symposium on Information, Computer and Communications Security, pp. 81–82 (2012)

    Google Scholar 

  12. Quinla. S., Dorward, V.S.,: another way to deal with archiva stockpiling. In: Proceedings of USENIX FAST, pp. 554–568 (2002)

    Google Scholar 

  13. Rahumed, C.H.C.H., Tang, Y., Lee, P.P.C., Lui, J.C.S.: A protected cloud reinforcement framework with guaranteed cancellation and adaptation control. In: Third International Workshop on Security in Cloud Computing, pp. 1704–1712 (2011)

    Google Scholar 

  14. de Carvalho, M.G., Laender, A.H.F.,. Gonc¸alves, M.A., da Silva, A.S.: Copy identification using genetic programming. In: Proceedings of the 23rd Annual ACM Symposium Connected Computing (SAC), pp. 1801–1806 (2008)

    Google Scholar 

  15. Bilenko, M., Mooney, R., Cohen, W., Ravi Kumar, P., Fienberg, S.: Versatile name matching in information integration. IEEE Intell. Syst. 18(5), 16–23 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. V. Pandu Ranga Rao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Pandu Ranga Rao, K.V., Krishna Reddy, V., Yakoob, S.K. (2018). Dynamic Secure Deduplication in Cloud Using Genetic Programming. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing, vol 542 . Springer, Singapore. https://doi.org/10.1007/978-981-10-3223-3_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3223-3_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3222-6

  • Online ISBN: 978-981-10-3223-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics