Journals Conference Bonfring Digital Library




International Conference on Evolution in Engineering & Management (ICEEM-2015), 30-31, January 2015

Full Text is available to the subscribed user. Use your subscription login to access,



Security with Authorized Deduplication Compression Using JHF and DR Techniques in Hybrid Cloud

S. Hemalatha and U. Muthaiah


Data deduplication is a method of reducing storage needs by eliminating redundant data. Only one unique instance of the data is actually retained on storage media. Redundant data is replaced with a pointer to the unique data copy and it has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, Jenkins hash function(JHF) techniques has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. The several deduplication techniques are implemented in Hybrid Cloud architecture. In additionally implement the Disaster Recovery(DR) technique in hybrid cloud. Our proposed system is implemented for text file, pdf file, book, and image and video, it also verify the confidentiality of private cloud. Simulation result shows that, the proposed system authorized duplicate check scheme incurs minimal overhead compared to normal operations and also it decrease the authorization steps parameters from above 60%.

Keywords: ---

Conference Name: Third National Conference on Networking and Communication Systems

Conference Date: 13, February 2015

Pages: 13-16

Paper ID: ncs04

Full Text





Home | Research |Journals | Conference | Worshop & Events | Bonfring Digital Library | Sitemap | Contact
© Bonfring 2013 | All Rights Reserved