Secure data deduplication in data centre: state of the art and perspectives Online publication date: Wed, 28-Sep-2016
by Yu Liu; Dawei Sun
International Journal of Wireless and Mobile Computing (IJWMC), Vol. 11, No. 1, 2016
Abstract: Along with the arrival of the age of big data, lots of data processing must rely on distributed processing of cloud computing, and the amount of data stored in the cloud is sharply increasing. Therefore, the management of massive data has become a noticeable challenge. One of the crucial challenges is how to delete the duplicate data while ensuring data privacy, wherefore the secure deduplication techniques appeared on the scene. In this paper, we first present three different mainstream secure deduplication strategies, convergent encryption, proof of ownership and twin data centre architecture, and make a brief description of their work process. Some variants on top of the three strategies which extend their functions or remedy old deficiencies and analysis of their own performance efficiency or their advantages and disadvantages are given. This paper also includes some state-of-the-art deduplication systems which are not based on the three above-mentioned strategies such as DupLESS, etc. They provide some new design ideas about secure deduplication in cloud data centre and may inspire people to design a better system.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Wireless and Mobile Computing (IJWMC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com