Wednesday, 22 Mar, 2023




Reliable Deduplication of Encrypted Data in Cloud Computing

International Journal of Distributed and Cloud Computing

Volume 4 Issue 1

Published: 2016
Author(s) Name: Santhosh R., Kalaiyarasi K. | Author(s) Affiliation: Department of Computer Science and Engineering, Faculty of Engineering, Karpagam University, India
Locked Subscribed Available for All


Cloud computing is a concept which is popular among not only software professionals but also common internet users. It allows a program to be executed on multiple connected machines at the same time over a network. Deduplication is one way of ensuring that the network and storage overhead is minimized. Digital data is growing exponentially and by removing redundancy deduplication technique achieves this. There are many deduplication schemes proposed but these schemes only focuses on the files without encryption. Convergent encryption allows the cloud to enable deduplication on encrypted files. However, it is vulnerable to dictionary attacks. In this paper, we propose a new scheme to address this issue. Instead of deriving the encryption key from the entire content, encryption key will be derived from each block of the content. Encrypted password of the user will be appended with the file content to make the file unique among the users. This will allow the files to be protected from the confirmation of the file attack.

Keywords: Attacks, Cloud, Deduplication, Encryption, Storage

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback ©, All rights reserved