An Efficient Data Deduplication Methodology in a Hybrid Cloud

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2017 by IJPTT Journal
Volume - 7 Issue - 1
Year of Publication : 2017
Authors : Naveentha, Sangeetha priyalakshmi


Naveentha, Sangeetha priyalakshmi "An Efficient Data Deduplication Methodology in a Hybrid Cloud". International Journal of P2P Network Trends and Technology (IJPTT), V7(1):6-9 Jan - Feb 2017, ISSN:2249-2615,, Published by Seventh Sense Research Group.


Data Deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data. By this technique the Storage Utilization in Cloud can be improved and saves bandwidth. To make the cloud storage more Secured during the process of deduplication, Convergent Encryption technique has been used to encrypt the data before sending to the cloud. Different from Conventional systems, the Advanced Deduplication System support authorized duplication check based on differential privileges of user besides data itself. Hybrid cloud architecture has been used where new deduplication constructions supporting authorized duplication check is performed. Deduplication is done both at file level and block level. This paper addresses the problem of achieving reliable and efficient key management in secured deduplication.


[1] “Secure De-duplication with Efficient and Reliable Convergent Key Management” Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing Lou in IEEE Transactions On Parallel And Distributed Systems.
[2] Li, J., Chen, X., Huang, X., Tang, S., Xiang, Y., Hassan, M., Alelaiwi A, “ SecureDistributed Deduplication Systems with Improved Reliability, “IEEE Transactions on Computers, Volume PP, Issue No. 99, Pages 1, February 2015, DOI - 10.1109/TC.2015.2401017.
[3] P. Anderson and L. Zhang, „„Fast and Secure Laptop Backups with Encrypted De-Duplication,‟‟ in Proc. USENIX LISA, 2010, pp. 1-8.
[4] M. Bellare, S. Keelveedhi, and T. Ristenpart, „„Message- Locked Encryption and Secure Deduplication,‟‟ in Proc. IACR Cryptology ePrint Archive, 2012, pp. 296-3122012:631.
[5] NesrineKaaniche, Maryline Laurent “ Client Side Deduplication Scheme Cloud Storage Environments” 6TH International Conference On New Technologies, And Security Year 2014.
[6] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, „„Proofs of Ownership in Remote Storage Systems,‟‟ in Proc. ACM Commun. Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds., 2011, pp. 491.
[7] R.D. Pietro and A. Sorniotti, „„Boosting Efficiency and Security in Proof of Ownership for Deduplication,‟‟ in Proc. ACM Symp. Inf., Comput. Commun. Security, H.Y. Youm and Y. Won, Eds., 2012, pg.81-82.
[8] ”Data Deduplication in Cloud Explained” tacenter/ data-deduplication

Hybrid cloud, Deduplication, Convergent encryption, key management.