GRD Journals | Global Research and Development Journal for Engineering | International Conference on Innovations in Engineering and Technology (ICIET) - 2016 | July 2016
e-ISSN: 2455-5703
Security and Privacy Enhancing in Multi-Cloud Architecture with Data De-Duplication 1N.
R. Anitha Rani 2P. Prem Kumar 1 P. G Student 2Associate Professor 1,2 Department of Computer Science & Engineering 1,2 K.L.N College of Engineering Pottapalayam, Sivagangai 630612, India Abstract Cloud computing makes IT more efficient and cost effective in today’s world. Cloud computing act as a virtual server that the user can access via internet on a needed basis and this eliminates the need for the companies to host their own servers and purchase of expensive software. On the other hand there arise many new types of cyber theft. The main concerns in cloud computing are data integrity, security and enhancement of storage space in the cloud. This paper focuses on maintaining data integrity and security from a user’s perspective and also provides clear understanding of achievable security merits by using multiple distinct clouds simultaneously and enhancing storage space of public cloud by DE duplication from a cloud service provider’s perspective. Symmetric key encryption is used to prevent unauthorized user from accessing data. Convergent encryption is used to maintain data confidentiality. Keyword- Data DE duplication, Data Confidentiality, Security, Data Integrity, Multi-Cloud __________________________________________________________________________________________________
I. INTRODUCTION In the current IT environment every organization is need to invest time and budget to scale up the IT infrastructure such as hardware, software and services. Cloud computing provides computing over the internet. Cloud services consist of highly optimized virtual Data Center that provides various software, hardware and information resource to the needful users. The organization can simply connect to the cloud and use the available resource on pay per user basis. This helps the company to avoid capital expenditure on additional on premise Infrastructure resource and instantly scale up or scale down according to business requirements[1]. Data DE duplication [Fig 1.] is very essential in today’s world to achieve bandwidth optimization and to lower the storage space by eliminating redundant data copies[2].
Fig. 1: Data DE duplication
Data DE duplication can be performed at two levels: 1) File Level DE duplication: eliminates duplicate copies of identical files. 2) Block Level DE duplication: eliminates duplicate data blocks in non-identical files The first and foremost challenge in the current IT world is to prevent sensitive data from being accessed by unauthorized users. In conventional encryption different users use their own key to encrypt data and as a result different cipher text is generated for the same file which belongs to different users. This makes DE duplication highly impossible. To overcome this symmetric key encryption is used to generate same key to encrypt and decrypt identical file of different users. Convergent key encryption provides data confidentiality and checks for redundant copies of data. Secure proof of ownership prevents unauthorized users to access data[3].
All rights reserved by www.grdjournals.com
145