Efficient Detection of Duplicate Data using Progressive Techniques

International Journal of Communication and Media Science
© 2016 by SSRG - IJCMS Journal
Volume 3 Issue 3
Year of Publication : 2016
Authors : M.Anusuya and R.Kiruba Kumari
pdf
How to Cite?

M.Anusuya and R.Kiruba Kumari, "Efficient Detection of Duplicate Data using Progressive Techniques," SSRG International Journal of Communication and Media Science, vol. 3,  no. 3, pp. 1-5, 2016. Crossref, https://doi.org/10.14445/2349641X/IJCMS-V3I5P101

Abstract:

 Privacy Preserving Data Mining Systems is to propose local data mining and global data mining. It attempts to benefit of extracting useful information from large volumes of data. Privacy-preserving data mining usually has multiple steps that translate to a three-tiered architecture. Online data collection systems are an example of new applications that threaten individual privacy. Already companies are sharing data mining models to obtain a richer set of data about mutual customers and their buying habits as Data Providers, Data Warehouse Server and Data Mining server. Our goal in investigating privacy preservation issues was to take a systemic view of architectural requirements and design principles and explore possible solutions that would lead to guidelines for building practical privacy preserving Central to the strategy are three protocols that govern privacy disclosure among entities as Data collection protocol, Inference Control Protocol and Information sharing Protocol.

Keywords:

   Privacy Preserving, Inference Control Protocol, Data Warehouse, Investigating.

References:

[1] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
[2] J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, „„Reclaiming Space from Duplicate Files in a Serverless Distributed File System, in Proc. ICDCS, 2002, pp. 617-624.
[3] W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer, “Feasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs”, SIGMETRICS 2000, ACM, 2000, pp. 34-43.
[4] A. Adya, W. J. Bolosky, M. Castro, R. Chaiken, G. Cermak, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, Dec.2002. USENIX.
[5] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings of the 22nd
[6] International Conference on Distributed Computing Systems
[7] M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, „„Secure Data Deduplication, in Proc. StorageSS, 2008, pp. 1-10.
[8] A. Juels and B. S. Kaliski, Jr. Pors: proofs of retrievability for large files. In ACM CCS 7, pages 584–597. ACM, 2007
[9] H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT 08, pages 90–107. Springer-Verlag, 2008. [10] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS‟09, pages 355–370. Springer-Verlag, 2009.
[11] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In ACM CCS ‟07, pages 598–609. ACM, 2007.
[12] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In ACM CCS ‟07, pages 598–609. ACM, 2007
[13] P. Anderson and L. Zhang, „„Fast and Secure Laptop Backupswith Encrypted De-Duplication, in Proc. USENIX LISA, 2010,pp. 1-8.
[14] M. Bellare, S. Keelveedhi, and T. Ristenpart, „„Message- Locked Encryption and Secure Deduplication, in Proc. IACR Cryptology ePrint Archive, 2012, pp. 296- 3122012:631.
[15] Bitcasa, ini_nite storage. http://www.bitcasa.com/. (Cited on page 3.) [16] Ciphertite data backup. http://www.ciphertite.com/. (Cited on page 3.)
[17] A. Rahumed, H. Chen, Y. Tang, P. Lee, and J. Lui. A secure cloud backup system with assured deletion andversion control. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on, pages160-167 IEEE, 2011.
[18] Z. Wilcox-O'Hearn and B. Warner. Tahoe: The leastauthority _lesystem. In Proceedings of the 4th ACM international workshop on Storage security and survivability, pages 21-26. ACM, 2008.
[19] S. P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. In D. Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 61-77. Springer, Aug. 2003.
[20] A. Yun, C. Shi, and Y. Kim, „„On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage, in Proc. ACM CCSW, Nov. 2009, pp. 67-76.
[21] M. Ben-Salem and S. J. Stolfo, “Modeling user searchbehavior for masquerade detection,” in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection . Heidelberg: Springer, September 2011, pp. 1–20.
[22] J. Pepitone, “Dropbox‟s password nightmare highlights cloud risks,” June 2011.
[23] Salvatore J. Stolfo, Malek Ben Salem and Angelos D. Keromytis “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud” IEEE Symposium On Security And Privacy Workshop (SPW) YEAR 2012
[24] .Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou” A Hybrid Cloud Approach for Secure Authorized Deduplication” IEEE Transactions On Parallel And Distributed System VOL:PP NO:99 YEAR 2013.
[25] I.Sudha1, A.Kannaki2, S.Jeevidha3” Alleviating Internal Data Theft Attacks by Decoy Technology in Cloud”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.3, March- 2014, pg. 217-222. B. M. Bowen and S. Hershkop, “Decoy Document Distributor: http://sneakers.cs.columbia.edu/ids/fog/,” 2009. [Online]. Available: http://sneakers.cs.columbia.edu/ids/FOG/
[26] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing Lou “Secure Deduplication with Efficient and Reliable Convergent Key Management” IEEE Transactions On Parallel And Distributed Systems, VOL. 25, NO. 6, JUNE 2014.