Int. J. of Wireless and Mobile Computing   »   2016 Vol.11, No.1

 

 

Title: Secure data deduplication in data centre: state of the art and perspectives

 

Authors: Yu Liu; Dawei Sun

 

Addresses:
School of Information Engineering, China University of Geosciences, Beijing 100083, China
School of Information Engineering, China University of Geosciences, Beijing 100083, China

 

Abstract: Along with the arrival of the age of big data, lots of data processing must rely on distributed processing of cloud computing, and the amount of data stored in the cloud is sharply increasing. Therefore, the management of massive data has become a noticeable challenge. One of the crucial challenges is how to delete the duplicate data while ensuring data privacy, wherefore the secure deduplication techniques appeared on the scene. In this paper, we first present three different mainstream secure deduplication strategies, convergent encryption, proof of ownership and twin data centre architecture, and make a brief description of their work process. Some variants on top of the three strategies which extend their functions or remedy old deficiencies and analysis of their own performance efficiency or their advantages and disadvantages are given. This paper also includes some state-of-the-art deduplication systems which are not based on the three above-mentioned strategies such as DupLESS, etc. They provide some new design ideas about secure deduplication in cloud data centre and may inspire people to design a better system.

 

Keywords: big data; secure data deduplication; convergent encryption; proof of ownership; twin data centre architecture; data security; distributed processing; cloud computing; cloud storage; cloud security; data privacy; privacy protection; privacy preservation; cloud data centres.

 

DOI: 10.1504/IJWMC.2016.079469

 

Int. J. of Wireless and Mobile Computing, 2016 Vol.11, No.1, pp.83 - 89

 

Submission date: 17 Jun 2016
Date of acceptance: 03 Jul 2016
Available online: 27 Sep 2016

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article