CSEIT1722252 | Received : 10 April 2017 | Accepted : 20 April 2017 | March-April-2017 [(2)2: 832-836]
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307
832
A Secure Verifiable Storage Deduplication Scheme on Bigdata
in Cloud
S. Indirakumari, A. Thilagavathy
Department of Computer Science and Engineering, R.M.K Engineering College, Chennai, Tamil Nadu, India
ABSTRACT
Cloud Computing is a emerging technology where we can get platform as a service, Software as a service,
infrastructure as a service, while getting storage as a service from cloud. Memory management are very most
important in cloud computing. In existing paper user can upload text files only and not a secured. In existing paper
we propose a user can upload all type of files (jpg, gif, png, audio, video, pdf, ppt) using deduplication technology.
We propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-
encryption. It is commonly used to reduce the space and bandwidth requirements of service by eliminating
redundant data and storing only a single copy of file using cloud service provider. Here we propose secure
deduplication to avoid the same files uploaded multiple times.
Keywords : Deduplication, Big Data, Cloud Computing, Access Control, Proxy Re-Encryption, Memory
Management
I. INTRODUCTION
Cloud computing is an innovative service mode.
Through the network to the required resources
(hardware, platform, and software), virtual integration
into a reliable and high performance of computing
platform. In cloud computing, all user data are stored in
the cloud resources like cloud nodes. The Cloud
computing is the use of computing resources that are
delivered as a service over a network. The resources are
made available on the internet as managed third-party
services. One of the most fundamental services offered
by cloud providers is data storage. The data is available
at any time because the cloud computing is an internet
based computing. The cloud service providers are
providing various services to the users. The conclusion
distribute to the user through the network when the user
needed the security. Although cloud computing has aim
to mature service model, and have large commercial,
cloud computing is still facing many problems[8].
Cloud Computing still facing the number of major
challenges: Safety, Stability and Performance issue.
Including the security and memory management
problem concerns the most.
A real cloud computing security incidents have
profound acknowledge the urgency of cloud security
and authentication issues, example for users cannot
access to their email and other personal data. More
important, due to the technical personnel not to be
make backups of their data, conclusion of Microsoft
cannot recover data. Although the cloud storage service
can realize multiple copy of files fault tolerance and
backup automatically, it is also guarantee 100 percent
security and authentication. Deduplication has proved
to achieve high cost savings storage needs for backup
applications. In this paper, we propose a scheme based
on data ownership challenge and Proxy Re-Encryption
(PRE) to manage encrypted data storage with
deduplication[5][8]. Specifically, the contributions of
this paper can be summarized below:
1. Our scheme can flexibly support data sharing with
deduplication even when the data holders or
offline.
2. We propose verify data ownership and check
duplicate storage with secure challenge and bigdata
support.
3. We integrate cloud data deduplication with access
control.