Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

Zheng Yan,Wenxiu Ding,Xixnu Yu,Haiqi Zhu,and Robert

H.Deng,Deduplication on Encrypted BigData in CloudIEEE


Transactions on Big Data, Vol. 2, No. 2, April-June 2016.

Description:
This paper propose a scheme where to deduplicate encrypted data stored
over the cloud based on ownership and proxy re-encryption.
Since this paper focused on the access control
Encrypted data can be securely accessed because only authorized data
holders can obtain the symmetric keys used for the data decryption
Ti Yu Wu, Jeng-Shyang Pan and Chia-Fan Lin,Improving Accessing
Efficiency of Cloud Storage Using De-Duplication and Feedback
SchemesIEEE Transactions on Big Data, Vol. 8, No. 1, March 2014.

Description:

This paper mainly concerns about the improving accessibility of the data in
the data server mainly by using de-duplication.
For the easy access it uses the technique called Index Name Server(INS) to
optimize node selection.
This also concerns about the IP information and busy level index
monitoring and server load balancing.
Junbeom Hur,Dongyoung Koo,Youngjoo Shin and Kyungtae
Kang,Secure Data Deduplication with Dynamic Ownership
Management in Cloud StorageIEEE Transactions on knowledge and

Data Engineering, Vol.28, No. 11, November 2016.

Description:
This paper addresses the ownership property of the data in accordance with
the encrypted one.
Each owner to share the same encryption key for the same data proposal is
modified with the different encryption key when any updates are made on
the original data

Observation:
This prevents data leakage not only to revoked users even though they
previously owned that data,but also to an honest-but-curious cloud storage
server and guarantees data integrity.
Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P.C. Lee, and Wenjing Lou,
A Hybrid Cloud Approach for Secure Authorized Deduplication
IEEE Transactions on Parallel and Distributed system Vol. 26, No. 5,
MAY 2015.
Description:
This paper proposes based on the authorization of the de-duplicated data in
a vast cloud system.
Authorization approach involves the privileges of the user and perform the
duplicate check.
Security analysis of this model demonstrates that it is secure in terms of
insider and outsider attacks specified in the proposed security model.
Authorized duplicate check scheme incurs minimal overhead compared to
convergent encryption and transfer.
Shengmei Luo, Guangyan Zhang, Chengwen Wu, Samee U. Khan,
Boafft: Distributed Deduplication for Big Data
Storage in the Cloud, IEEE Transactions on Cloud Computing Vol.
61, No. 11, January 2015.

Description:
This majorly looks for the distributed de-duplication for the storage in the
data server and process across the multiple servers.
Firstly, the Boafft uses an efficient data routing algorithm based on data
similarity that reduces the network overhead by quickly identifying the
storage location.
Secondly, the Boafft maintains an in-memory similarity indexing in each
data server that helps avoid a large number of random disk reads and
writes, which in turn accelerates local data de-duplication.

Thirdly, the Boafft constructs hot fingerprint cache in each data server
based on access frequency, so as to improve the data de-duplication ratio.

You might also like