Detecting File Repeatation Using Convergent Encryption Scheme On Cloud

Authors

  • Jeyasankar.G  Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • Deepanraj.E  Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • Ramakrishnan.R  Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

Detecting repeatation of data in a cloud is technique of removing duplicate copies of data. It is widely used in cloud to save space and bandwidth. However, single copy of each file stored in cloud server even if many number of users owns that single copy. As a result, the de-duplication technique increases the storage usability while decreasing the reliability. By which the every user encrypt the file before uploading. The confidentiality on data is made by using convergent encryption algorithm, which also detects data repeatation. In convergent encryption scheme a user or data owner derives the key from the file content and encrypts the file with that key. In addition the user generate the tag for that file copy and put it into the data center, such that the tag is used for detecting repeatation of data on cloud.

Abstract

Detecting repeatation of data in a cloud is technique of removing duplicate copies of data. It is widely used in cloud to save space and bandwidth. However, single copy of each file stored in cloud server even if many number of users owns that single copy. As a result, the de-duplication technique increases the storage usability while decreasing the reliability. By which the every user encrypt the file before uploading. The confidentiality on data is made by using convergent encryption algorithm, which also detects data repeatation. In convergent encryption scheme a user or data owner derives the key from the file content and encrypts the file with that key. In addition the user generate the tag for that file copy and put it into the data center, such that the tag is used for detecting repeatation of data on cloud.

References

  1. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure De-duplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2014.
  2. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg,‘‘Proofs of Ownership in Remote Storage Systems,’’ in Proc. ACM Conf. Comput. Commun. Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds., 2011, pp. 491-500.
  3. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, "A secure data deduplication scheme for cloud storage," in Technical Report, 2013.
  4. W. K. Ng, Y. Wen, and H. Zhu, "Private data deduplication protocols in cloud storage." in Proceedings of the 27th Annual ACM Symposium on Applied Computing, S.Ossowski and P. Lecca, Eds.ACM, 2012, pp. 441–446.
  5. J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615–1625.
  6. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems." in ACM Conference on Computer and Communications Security,  Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500.
  7. D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology — CRYPTO 2001, ser. Lecture Notes in Computer Science, J. Kilian, Ed. Springer Berlin Heidelberg, 2001, vol. 2139, pp. 213–229.
  8. R. D. Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication." in ACM Symposium on Information, Computer and Communications Security, H. Y. Youm and Y. Won, Eds. ACM, 2012, pp. 81–82.
  9. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote data checking using provable data possession," ACM Trans.  Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, 2011.
  10. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proceedings of the 4th International Conference on  Security and Privacy in Communication Networks, ser. SecureComm ’08. New York, NY, USA: ACM, 2008, pp. 9:1–9:10.
  11. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proceedings of the 16th ACM Conference on Computer and   Communications Security, ser. CCS ’09. New York, NY, USA: ACM, 2009, pp. 213–222.

Downloads

Published

2016-04-30

Issue

Section

Research Articles

How to Cite

[1]
Jeyasankar.G, Deepanraj.E, Ramakrishnan.R, " Detecting File Repeatation Using Convergent Encryption Scheme On Cloud, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 2, Issue 2, pp.114-117, March-April-2016.