Author : M.Maharasi 1
Date of Publication :14th March 2018
Abstract: Duplication removal is the important aspect of data storage in cloud. CP-ABE ciphertext-policy attribute-based encryption (CP-ABE) scheme supports secure deduplication. Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials. Existing ABE encryption system only used for secure encryption and does not support secure deduplication, duplication removal from identical data is important in order to save storage space and network bandwidth. Proposed system achieves confidentiality in data sharing and also achieves standard notion of semantic security for data confidentiality. In addition, we put forth a methodology to modify a ciphertext over one access policy into ciphertext of the same plaintext but under other access policies without revealing the underlying plaintext. In proposed work of this project implement using AES with blowfish algorithm is used to encrypt the files before storing it on the cloud. Blowfish has high security when compared to CP-ABE. The combination of enhanced AES and blowfish is used for data confidentiality. Performance of the proposed system is evaluated based on time taken for encryption/decryption, throughput and memory usage for different data formats like text file, image file, audio file and video file. And also key sharing process is to modified in proposed system. A one valid key is sharing to the users to access the data.
Reference :
-
- D. Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress Publishing / Elsevier, 2014. [Online].
- K. R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud cryptography: Theory, practice and future research directions,” Future Generation Comp. Syst., vol. 62, pp. 51–53, 2016.
- K. R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud forensics: State-of-the-art and future directions,” Digital Investigation, vol. 18, pp. 77–78, 2016.
- Y. Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo, “Cloud based data sharing with fine-grained proxy re-encryption,” Pervasive and Mobile Computing, vol. 28, pp. 122–134, 2016.
- D. Quick and K. R. Choo, “Google drive: Forensic analysis of data remnants,” J. Network and Computer Applications, vol. 40, pp. 179–193, 2014.
- A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology - EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005, vol. 3494. Springer, 2005, pp. 457–473.
- B. Zhu, K. Li, and R. H. Patterson, “Avoiding the disk bottleneck in the data domain deduplication file system,” FAST 2008, February 26-29, 2008, San Jose, CA, USA. USENIX, 2008, pp. 269–282.