Skip to main content

Data Deduplication and Fine-Grained Auditing on Big Data in Cloud Storage

  • Conference paper
  • First Online:
Advances in Machine Learning and Data Science

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 705))

Abstract

The computing expedient and indulgence are made available in cloud servers by redistributing innumerable resources over the cyberspace. The utmost hefty on-demand services in cloud are data storage. In the world of technocrats, there is a colossal use of national information infrastructure from where an immense amount of data is produced in day-to-day life. To handle those prodigious data on demand is a challenging chore for current data storage systems. The prominence of data deduplication (dedupe) is pointed out by data explosion and colossal slew in redundant data. In the proposed scheme, source-based deduplication is used to eliminate duplicate data, where the client check for the unique data in local (or) remote index through the backup of lower network bandwidth with fast and lower computation overhead. Firstly, in source-based deduplication the data are stored in the physical memory and the fragments of the data are cuckoo hashed before storing the data their physical memory. Secondly, the cloud correctness of data and security is a prime concern, and it is achieved by signing the data block before sending it to the server. And the proposed scheme guarantees the data integrity by fine-grained auditing using Boneh–Lynn–Shacham (BLS) algorithm for signing process, which is one of the secured algorithms. The homomorphic authentication with random masking technique is used to attain privacy-preserving and public auditing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jiang, T., Chen, X.: Secure and efficient cloud data deduplication with randomized tag. IEEE Trans. Inf. Foren. Secur. 12(3) (2017)

    Google Scholar 

  2. Qin, C., Li, J., Lee, P.P.C.: The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Trans. Storage 13(1), Article 9, 30 p. (2017)

    Article  Google Scholar 

  3. Mao, B, Jiang, H., Wu, S., Tian, L.: POD: performance oriented I/O deduplication for primary storage systems in the cloud. In: IEEE International Parallel and Distributed Processing Symposium, vol. 10, pp. 767–776 (2014)

    Google Scholar 

  4. Zhou, B, Wen, J.-T: Metadata feedback and utilization for data deduplication across WAN. J. Comput. Sci. Technol. 31(3), 604–623 (2016)

    Article  Google Scholar 

  5. Paulo, J., Pereira, J.: Efficient deduplication in a distributed primary storage infrastructure. ACM Trans. Storage 12(4), Article 20, 35 p. (2016)

    Google Scholar 

  6. Fu, M., Lee, P.P.C., Feng, D., Chen, Z., Xiao, Y.: A simulation analysis of reliability in primary storage deduplication. In: IEEE International Symposium on Workload Characterization (IISWC), pp. 1–10 (2016)

    Google Scholar 

  7. Zhou, B., Wen, J.T.: Improving metadata caching efficiency for data deduplication via in-RAMmetadata utilization. J. Comput. Sci. Technol. 31(4), 805–819 (2016)

    Article  Google Scholar 

  8. De Capitani, S., di Vimercati, S., Foresti, S.J.: Fragmentation in presence of data dependencies. IEEE Trans. Dependable Secur. Comput. 1(6), 510–522 (2014)

    Google Scholar 

  9. Frieze, A., Mitzenmacher, M.: An Analysis of Random-Walk Cuckoo Hashing. Published in LNCS, pp. 490–503 (2009)

    Chapter  Google Scholar 

  10. Drmota, M., Kutzelnigg, R.: A Precise analysis of cuckoo hashing. ACM Trans. Algorithm 8(2), 1–40 (2012)

    Article  MathSciNet  Google Scholar 

  11. Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9) (2015)

    Article  MathSciNet  Google Scholar 

  12. Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8) (2016)

    Article  MathSciNet  Google Scholar 

  13. Zhanga, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Elsevier, Inf. Sci. (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to RN. Karthika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Karthika, R., Valliyammai, C., Abisha, D. (2018). Data Deduplication and Fine-Grained Auditing on Big Data in Cloud Storage. In: Reddy Edla, D., Lingras, P., Venkatanareshbabu K. (eds) Advances in Machine Learning and Data Science. Advances in Intelligent Systems and Computing, vol 705. Springer, Singapore. https://doi.org/10.1007/978-981-10-8569-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8569-7_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8568-0

  • Online ISBN: 978-981-10-8569-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics