Authors: Yu Liu; Dawei Sun
Addresses: School of Information Engineering, China University of Geosciences, Beijing 100083, China ' School of Information Engineering, China University of Geosciences, Beijing 100083, China
Abstract: Along with the arrival of the age of big data, lots of data processing must rely on distributed processing of cloud computing, and the amount of data stored in the cloud is sharply increasing. Therefore, the management of massive data has become a noticeable challenge. One of the crucial challenges is how to delete the duplicate data while ensuring data privacy, wherefore the secure deduplication techniques appeared on the scene. In this paper, we first present three different mainstream secure deduplication strategies, convergent encryption, proof of ownership and twin data centre architecture, and make a brief description of their work process. Some variants on top of the three strategies which extend their functions or remedy old deficiencies and analysis of their own performance efficiency or their advantages and disadvantages are given. This paper also includes some state-of-the-art deduplication systems which are not based on the three above-mentioned strategies such as DupLESS, etc. They provide some new design ideas about secure deduplication in cloud data centre and may inspire people to design a better system.
Keywords: big data; secure data deduplication; convergent encryption; proof of ownership; twin data centre architecture; data security; distributed processing; cloud computing; cloud storage; cloud security; data privacy; privacy protection; privacy preservation; cloud data centres.
International Journal of Wireless and Mobile Computing, 2016 Vol.11 No.1, pp.83 - 89
Available online: 27 Sep 2016 *Full-text access for editors Access for subscribers Purchase this article Comment on this article