Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A Secure Deduplication Mechanism for Sensitive Data in Public Cloud Storage

Author : Deepa P.B 1 Dr.Rudramurthy M.S 2

Date of Publication :21st June 2017

Abstract: nowadays, cloud-based services are gaining more importance in leveraging services for large scale storage and distribution. These provide cost effectiveness, time saving and efficient utilization of computing resources. Many enterprises have decided to envision a staged migration for their data to public cloud, for better management of backup data. As data progressively grows, the cloud storage systems continuously face challenges in saving storage capacity. Data Deduplication gives solution to such challenges. It is a data compression technique for eliminating the redundant data. Assuming that cloud service provider may not be trustworthy (i.e. is honest but curious). The security, bandwidth and latency are of top concerns for an enterprise to store sensitive data in the public cloud storage. Considering these security challenges, we propose and implement a client side deduplication scheme for securely storing enterprise sensitive data via the pubic cloud. Efficiently and reliably managing the huge number of convergent keys by the user is a critical issue. Hence we have built a system where each convergent key is secured and the same is outsourced to the cloud. To avoid the weakness of convergent encryption, double encryption is done. By following this method, we can save storage space and cost. It also reduces bandwidth and ensures better confidentiality towards unauthorized users.

Reference :

    1. Yuan, Jiawei, and Shucheng Yu. "Secure and constant cost public cloud storage auditing with deduplication." Communications and Network Security (CNS), 2013 IEEE Conference on. IEEE, 2013.
    2. J. Gantz and D. Reinsel, “The digital universe decade – are you ready?”http://www.emc.com/collateral/analystreports/idc-digital-universe-are-you-ready.pdf, May 2010.
    3. Mi Wen, Kaoru Ota, He Li, Jingsheng Lei, Chunhua Gu, and Zhou Su. “Secure data deduplication with reliable key management for dynamic updates in cpss”. IEEETransactions on Computational Social Systems, 2(4):137{147, 2015.
    4. John R Douceur, Atul Adya, William J Bolosky, P Simon, and Marvin Theimer. “Reclaiming space from duplicate _les in a serverless distributed _le system”. In Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on, pages 617{624. IEEE, 2002.
    5. I Nandhini, K Selvappriya, and S Tamilselvi. “A review of hilevel authorized deduplication method for cloud storage system”. In Advanced Computing and Communication Systems (ICACCS),
    6. Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. “Message-locked encryption and secure deduplication”. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 296{312. Springer, 2013.
    7. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick PC Lee, and Wenjing Lou. “A hybrid cloud approach for secure authorized deduplication”. IEEE Transactions on Parallel and Distributed Systems, 26(5):1206{1216, 2015.
    8. Jian Liu,Liu, N Asokan, and Benny Pinkas. “Secure deduplication of encrypted data without additional independent servers”. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 874{885. ACM, 2015.
    9. Danny Harnik, Benny Pinkas, and Alexandra ShulmanPeleg. “Side channels in cloud services: Deduplication in cloud storage”. IEEE Security & Privacy, 8(6):40{47, 2010.
    10. Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. “Dupless: Server-aided encryption for deduplicated storage”. IACR Cryptology ePrint Archive, 2013:429.
    11. Jan Stanek, Alessandro Sorniotti, Elli Androulaki, and Lukas Kencl. “A secure data deduplication scheme for cloud storage”. In International Conference on Financial Cryptography and Data Security, pages 99{118. Springer, 2014. 2016 3rd International Conference on, volume 1, pages 1{5. IEEE, 2016.
    12. Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick PC Lee, and Wenjing Lou. “Secure deduplication with efficient and reliable convergent key management”. IEEE transactions on parallel and distributed systems, 25(6):1615{1625, 2014.
    13. Yitao Duan. “Distributed key generation for encrypted deduplication: Achieving the strongest privacy”. In Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, pages 57{68. ACM, 2014.
    14. Pasquale Puzio, Re_k Molva, Melek Onen, and Sergio loureiro. “Cloudedup: secure deduplication with encrypted data for cloud storage”. In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on, volume 1, pages 363{370. IEEE, 2013.

Recent Article