Advertisement

Data Deduplication and Fine-Grained Auditing on Big Data in Cloud Storage

  • RN. Karthika
  • C. Valliyammai
  • D. Abisha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 705)

Abstract

The computing expedient and indulgence are made available in cloud servers by redistributing innumerable resources over the cyberspace. The utmost hefty on-demand services in cloud are data storage. In the world of technocrats, there is a colossal use of national information infrastructure from where an immense amount of data is produced in day-to-day life. To handle those prodigious data on demand is a challenging chore for current data storage systems. The prominence of data deduplication (dedupe) is pointed out by data explosion and colossal slew in redundant data. In the proposed scheme, source-based deduplication is used to eliminate duplicate data, where the client check for the unique data in local (or) remote index through the backup of lower network bandwidth with fast and lower computation overhead. Firstly, in source-based deduplication the data are stored in the physical memory and the fragments of the data are cuckoo hashed before storing the data their physical memory. Secondly, the cloud correctness of data and security is a prime concern, and it is achieved by signing the data block before sending it to the server. And the proposed scheme guarantees the data integrity by fine-grained auditing using Boneh–Lynn–Shacham (BLS) algorithm for signing process, which is one of the secured algorithms. The homomorphic authentication with random masking technique is used to attain privacy-preserving and public auditing.

Keywords

Deduplication Cloud storage Cyberspace Infobahn Prodigious data Fine-grained auditing Cuckoo hashing 

References

  1. 1.
    Jiang, T., Chen, X.: Secure and efficient cloud data deduplication with randomized tag. IEEE Trans. Inf. Foren. Secur. 12(3) (2017)Google Scholar
  2. 2.
    Qin, C., Li, J., Lee, P.P.C.: The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Trans. Storage 13(1), Article 9, 30 p. (2017)CrossRefGoogle Scholar
  3. 3.
    Mao, B, Jiang, H., Wu, S., Tian, L.: POD: performance oriented I/O deduplication for primary storage systems in the cloud. In: IEEE International Parallel and Distributed Processing Symposium, vol. 10, pp. 767–776 (2014)Google Scholar
  4. 4.
    Zhou, B, Wen, J.-T: Metadata feedback and utilization for data deduplication across WAN. J. Comput. Sci. Technol. 31(3), 604–623 (2016)CrossRefGoogle Scholar
  5. 5.
    Paulo, J., Pereira, J.: Efficient deduplication in a distributed primary storage infrastructure. ACM Trans. Storage 12(4), Article 20, 35 p. (2016)Google Scholar
  6. 6.
    Fu, M., Lee, P.P.C., Feng, D., Chen, Z., Xiao, Y.: A simulation analysis of reliability in primary storage deduplication. In: IEEE International Symposium on Workload Characterization (IISWC), pp. 1–10 (2016)Google Scholar
  7. 7.
    Zhou, B., Wen, J.T.: Improving metadata caching efficiency for data deduplication via in-RAMmetadata utilization. J. Comput. Sci. Technol. 31(4), 805–819 (2016)CrossRefGoogle Scholar
  8. 8.
    De Capitani, S., di Vimercati, S., Foresti, S.J.: Fragmentation in presence of data dependencies. IEEE Trans. Dependable Secur. Comput. 1(6), 510–522 (2014)Google Scholar
  9. 9.
    Frieze, A., Mitzenmacher, M.: An Analysis of Random-Walk Cuckoo Hashing. Published in LNCS, pp. 490–503 (2009)CrossRefGoogle Scholar
  10. 10.
    Drmota, M., Kutzelnigg, R.: A Precise analysis of cuckoo hashing. ACM Trans. Algorithm 8(2), 1–40 (2012)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9) (2015)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8) (2016)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Zhanga, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Elsevier, Inf. Sci. (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer TechnologyMIT Campus, Anna UniversityChennaiIndia

Personalised recommendations