Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Deduplication with Reliable Convergent Key Management in Hybrid Cloud

M. Gomathi Pradeepa, S. Geetha

Abstract


Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data in cloud storage to reduce the amount of storage space and save bandwidth. Traditional encryption techniques are providing data confidentiality which is incompatible with data deduplication. Specifically, traditional encryption requires different users to encrypt their data with their own keys. Thus, identical data copies of different users will lead to different cipher texts, making deduplication impossible. To overcome that de duplication technique used to eliminate redundant data by keeping only one physical copy and referring other redundant data to that copy. Before sending the data to the cloud, the data will be encrypted and it will send the token for security to avoid duplicate data for improving the cloud storage space. Although data deduplication brings a lot of benefits, security and privacy concerns arise as users’ sensitive data are susceptible to both inside and outside attacks.


Keywords


Deduplication, Authorized Duplicate Check, Confidentiality, Hybrid Cloud, Security

Full Text:

PDF

References


OpenSSL Project. http://www.openssl .org/.

P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296– 312, 2013.

M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.

M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

D. Ferraiolo and R. Kuhn. Role-based access controls. In 15th NIST-NCSC National Computer Security Conf., 1992.

GNU Libmicrohttpd. http://www.gnu.org/software/libmicrohttpd/.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.