This paper is published in Volume-5, Issue-2, 2019
Area
Information Technology
Author
Prateek Naharia, Eshan Pacheriwala, Soumyajyoti Dutta, M. Vinodhini
Org/Univ
SRM Institute of Science and Technology Chennai, Tamil Nadu, India
Pub. Date
23 April, 2019
Paper ID
V5I2-2049
Publisher
Keywords
P-O-W - Proof of Ownership, AES - Advanced Encryption Standard, DES- Data Encryption Standard, SDFS - Serverless Distributed File System, CPU - Central Processing Unit, JAVA -> platform independence, DFD -> Data Flow Diagram, UML -> Unified Modelling Language, SRS -> Software Requirement Specification, SQL -> Structured Query Language, IDE -> Integrated Development Environment

Citationsacebook

IEEE
Prateek Naharia, Eshan Pacheriwala, Soumyajyoti Dutta, M. Vinodhini. A secure client side deduplication scheme in cloud storage environments, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Prateek Naharia, Eshan Pacheriwala, Soumyajyoti Dutta, M. Vinodhini (2019). A secure client side deduplication scheme in cloud storage environments. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.

MLA
Prateek Naharia, Eshan Pacheriwala, Soumyajyoti Dutta, M. Vinodhini. "A secure client side deduplication scheme in cloud storage environments." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.

Abstract

Freshly identified and endorsed the trend of holding cloud-based services for large scale content storage, processing, and distribution. Security is the top concerns for open cloud environments. Towards these security challenges, we propose and implement, on Open Stack Swift, a new client-side deduplication scheme for securely storing and sharing outsourced data via the public cloud. The originality of our proposal is twofold. First, it ensures better confidentiality towards unauthorized users. That is, every client computes a per data key to encrypt the data that he intends to store in the cloud. hence, data access is with the data owner. Second, by accessing rights in the metadata file, an authorized user can decipher an encrypted file only with his private key. It elaborates a computationally low-cost method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to make an attempt and also impossible to undetectably modify or destroy.