115
Views
3
CrossRef citations to date
0
Altmetric
Articles

SEEDDUP: A Three-Tier SEcurE Data DedUPlication Architecture-Based Storage and Retrieval for Cross-Domains Over Cloud

&

References

  • E. Bocchi, I. Drago, and M. Mellia, “Personal cloud storage benchmarks and comparison,” IEEE Trans. Cloud Comp., Vol. 5, no. 4, pp. 751–64, Dec 2017.
  • D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services, the case of deduplication in cloud storage,” IEEE Secur. Priv. Mag., Vol. 8, no. 6, pp. 40–7, January 2011.
  • J. Li, X. Chen, X. Huang, S. Tang, Y. Xiang, M. Mehedi Hassan, and A. Alelaiwi, “Secure distributed deduplication systems with improved reliability,” IEEE Trans. Comput., Vol. 64, no. 12, pp. 3569–79, 2015.
  • J. Hur, D. Koo, Y. Shin, and K. Kang, “Secure data deduplication with dynamic ownership management in cloud storage,” IEEE. Trans. Knowl. Data. Environ., Vol. 28, no. 1, pp. 3113–25, Jun 2016.
  • H. Kwon, C. Hahn, D. Kim, and J. Hur, “Secure deduplication system for multimedia data with user revocation in cloud storage,” Multimed. Tools Appl., Vol. 76, no. 4, pp. 5889–903, 2017.
  • R. N. S. Widodo, H. Lim, and M. Atiquzzaman, “SDM: smart deduplication for mobile cloud storage,” Future Gener. Comp. Sys., Vol. 70, pp. 64–73, 2017.
  • S. Luo, G. Zhang, C. Wu, S. U. Khan, and K. Li, “Boafft: distributed deduplication for big data storage in the cloud,” IEEE Trans. Cloud Comp., Vol. 61, no. 11, pp. 1–13, Dec 2015.
  • W. Xia, H. Jiang, D. Feng, and L. Tian, “DARE: A deduplication-aware resemblance detection and elimination scheme for data reduction with low overheads,” IEEE Trans. Comput., Vol. 65, no. 6, pp. 1692–705, 2016.
  • A. Venish, and K. Sivasankar. “Study of Chunking algorithm in data deduplication,” in Proceedings of the International Conference on Soft Computing Systems, Adv. Intell. Syst., Vol. 398, pp. 13–20, Jan 2016.
  • Y. Yang, X. Qin, G. Sun, Z. Yang, and Z. Zu, “Data deduplication in wireless multimedia monitoring network,” Int. J. Distrib. Sens., Vol. 12, 1–7, Dec 2013.
  • X. Li, J. Li, and F. Huang, “A secure cloud storage supporting privacy preserving Fuzzy deduplication,” Soft Comput., Vol. 20, no. 4, pp. 1437–48, Jan 2015.
  • J. R. Jane Rubel Angelina, S. Kambaraj, and V. Dharmarajan, “High-speed data deduplication using parallelized cuckoo hashing,” Turk. J. Electr. Eng. Co., Vol. 26, pp. 1417–29, Jun 2020.
  • Y. Allu, F. Douglis, M. Kamat, P. Shilane, H. Patterson, and B. Zhu, “Backup to the future: How workload and hardware changes continually redefine data domain file systems,” Computer, Vol. 50, no. 07, pp. 64–72, Jul 2017.
  • J. Li, X. Chen, M. Li, P. P. C. Lee, and W. Lou, “Secure deduplictaion with efficient and reliable convergent key management,” IEEE Trans. Parall. Distr., Vol. 25, no. 6, pp. 1615–25, Jun 2014.
  • W. Xia, Y. Zhou, H. Jiang, D. Feng, Y. Hua, Y. Hu, W. Zhang, and Q. Liu. “FastCDC: a fast and efficient Content-defined chunking approach for data deduplication”, USENIX Annual Technical Conference (USENIC ATCí16), Denver, Co, USA, June 2016.
  • R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: block-level message locked encryption for secure large file deduplication,” IEEE Trans. Inf. Foren. Sec., Vol. 10, no. 2, pp. 2643–52, Aug 2015.
  • Y. Shin, and K. Kim, “Efficient and secure file deduplication in cloud storage,” IEICE Trans. Inf. Syst., Vol. E97-D, no. 2, pp. 184–97, Feb 2014.
  • E. Daniel, and N. A. Vasanthi, “LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment,” Cluster Comput., Vol. 22, 1–12, Nov 2017.
  • R. N. S. Widodo, H. Lim, and M. Atiquzzaman, “A new content defined chunking algorithm for data deduplication in cloud storage,” Fut. Gener. Comp., Vol. 71, pp. 145–56, Jun 2017.
  • B. Zhou, S. D. Zhang, Y. Zhang, and J. H. Tan, “A bit string content aware chunking strategy for reduced CPU energy on cloud storage,” J. Electr. Comput. Eng., Vol. 2015, 1–9, Aug 2015.
  • S. Singhal, A. Kaushik, and P. Sharma, “A novel approach of data deduplication for distributed storage,” Int. J. Eng. Tech., Vol. 7, no. 2.4, pp. 46–52, Mar 2018.
  • B. Mao, H. Jiang, S. Wu, and L. Tian, “Leveraging data deduplication to improve the performance of primary storage systems in the cloud,” IEEE Trans. Comput., Vol. 65, pp. 1775–1788, Jul 2015.
  • X. Y. Xuan, X. Nong, L. Fang, S. Zhen, and H. W. Hui, “AR-Dedupe: an efficient deduplication approach for cluster deduplication system,” J. Shanghai Jiaot. Univ., Vol. 20, no. 1, pp. 76–81, Jan 2015.
  • J. Xiong, Y. Zhang, X. Li, M. Lin, and Z. Yao, “RSE-PoW: a role symmetric encryption PoW scheme with authorized deduplication for multimedia data,” Mobile Netw. Appl., Vol. 23, no. 3, pp. 650–63, 2018.
  • P. Zhang, P. Huang, X. He, H. Wang, and K. Zhou, “Resemblance and mergence based indexing for high performance data deduplication,” J. Syst. Softw., Vol. 128, pp. 11–24, Dec 2017.
  • K. W. Su, J. S. Leu, M. C. Yu, Y. T. Wu, E. C. Lee, and T. Song, “Design and implementation of various file deduplication schemes on storage devices,” Mobile Netw. Appl., Vol. 22, no. 1, pp. 40–50, Jan 2017.
  • B. Zhou, and J. T. Wen, “A data deduplication framework of disk images with adaptive block skipping,” J. Comput. Sci. Technol., Vol. 31, no. 4, pp. 820–35, Jul 2016.
  • Z. Sun, J. Shen, and J. Yong, “A novel approach to data deduplication over the engineering-oriented cloud systems, University of Wollongong Australia,” Integr. Comput. Aid. E, Vol. 20, no. 1, pp. 45–57, Jan 2013.
  • S. Waghmare, “Authorized deduplication: an approach for secure cloud environment,” Proc. Comput. Sci., Vol. 78, pp. 815–23, 2016.
  • S. Jiang, T. Jiang, and L. Wang, “Secure and efficient cloud data deduplication with ownership management,” IEEE Trans. Serv. Comput., Vol. 13, 1–14, Nov 2017.
  • X. Yang, R. Lu, K. K. Raymond Choo, F. Yin, and X. Tang, “Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud,” IEEE Trans. Big. Data, 1–12, Jun 2017.
  • C. Yu, S. Prasad Gochhayat, M. Conti, and C. S. Lu, “Privacy aware data deduplication for side channel in cloud storage,” IEEE Trans. Cloud Comp., Vol. 8, 1–13, Jun 2018.
  • Z. Yan, L. Zhang, W. Ding, and Q. Zheng, “Heterogeneous data storage management with deduplication in cloud computing,” IEEE. Trans. Big Data, Vol. 5, 1–15, May 2017.
  • Y. Zhang, H. Su, M. Yang, D. Zheng, F. Ren, and Q. Zhao, “Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing,” Secur. Commun. Netw., Vol. 2018, 1–13, Sep 2018.
  • B. K. Kim, S. J. Oh, S. B. Jang, and Y. W. Ko, “File similarity evaluation scheme for multimedia data using partial hash information,” Mob. Netw. Appl., Vol. 76, no. 19, pp. 19649–63, Feb 2017.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.