Open Access Open Access  Restricted Access Subscription or Fee Access

A Hybrid Cloud System for Authorized Deduplication with Improved Security Using Dual Encryption

A. K. Diyab, A. Ambarish

Abstract


Nowadays the increasing volume of data in the cloud is a critical challenge faced by the cloud computing environment. Data deduplication is a well known technique and it can be used for eliminating the redundant copies of the data from the cloud by keeping only single physical copy of the data. The deduplication can be make authorized by considering the privileges of the user during the deduplication procedure. For making deduplication possible, convergent encryption scheme is used for encrypting the data before outsourcing it to the cloud server. For improving the security of the data Dual encryption procedure is applied by generating the encryption keys from the data itself.


Keywords


Deduplication, Hybrid Cloud, Convergent Encryption, File Token.

Full Text:

PDF

References


Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P.C. Lee, and Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, in IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 5, MAY 2015.

P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,” in Proc. 24th Int. Conf. Large Installation Syst. Admin., 2010, pp. 29–40.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179–194.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296–312.

M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,” J. Cryptol., vol. 22, no. 1, pp. 1–61, 2009.

M. Bellare and A. Palacio, “Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks,” in Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol., 2002, pp. 162–177.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing,” in Proc. Workshop Cryptography Security Clouds, 2011, pp. 32–44.

Ferraiolo and R. Kuhn, “Role-based access controls, ” in Proc. 15th NIST-NCSC Nat. Comput. Security Conf., 1992, pp. 554–563.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proc. ACM Conf. Comput. Commun. Security, 2011, pp. 491–500.

S. Quinlan and S. Dorward, “Venti: A new approach to archival storage,” in Proc. 1st USENIX Conf. File Storage Technol., Jan. 2002,p. 7.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role-based access control models,” IEEE Comput., vol. 29, no. 2, pp. 38–47, Feb. 1996.

Ms. Madhuri. A. Kavade, Prof A. C. Lomte,”A Literature Survey on Secure De-Duplication Using Convergent Encryption Key Management”, International journal of Engineering and Computer Science ISSN:2319-7242 Volume 3 Issue 11 November,2014.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.