Home > Archives > IJSRST162240 IJSRST-Library

Detecting File Repeatation Using Convergent Encryption Scheme On Cloud

Authors(3) :-Jeyasankar.G, Deepanraj.E, Ramakrishnan.R

Detecting repeatation of data in a cloud is technique of removing duplicate copies of data. It is widely used in cloud to save space and bandwidth. However, single copy of each file stored in cloud server even if many number of users owns that single copy. As a result, the de-duplication technique increases the storage usability while decreasing the reliability. By which the every user encrypt the file before uploading. The confidentiality on data is made by using convergent encryption algorithm, which also detects data repeatation. In convergent encryption scheme a user or data owner derives the key from the file content and encrypts the file with that key. In addition the user generate the tag for that file copy and put it into the data center, such that the tag is used for detecting repeatation of data on cloud.
Jeyasankar.G, Deepanraj.E, Ramakrishnan.R
Detecting repeatation of data in a cloud is technique of removing duplicate copies of data. It is widely used in cloud to save space and bandwidth. However, single copy of each file stored in cloud server even if many number of users owns that single copy. As a result, the de-duplication technique increases the storage usability while decreasing the reliability. By which the every user encrypt the file before uploading. The confidentiality on data is made by using convergent encryption algorithm, which also detects data repeatation. In convergent encryption scheme a user or data owner derives the key from the file content and encrypts the file with that key. In addition the user generate the tag for that file copy and put it into the data center, such that the tag is used for detecting repeatation of data on cloud.
  1. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure De-duplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2014.
  2. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg,‘‘Proofs of Ownership in Remote Storage Systems,’’ in Proc. ACM Conf. Comput. Commun. Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds., 2011, pp. 491-500.
  3. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, "A secure data deduplication scheme for cloud storage," in Technical Report, 2013.
  4. W. K. Ng, Y. Wen, and H. Zhu, "Private data deduplication protocols in cloud storage." in Proceedings of the 27th Annual ACM Symposium on Applied Computing, S.Ossowski and P. Lecca, Eds.ACM, 2012, pp. 441–446.
  5. J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615–1625.
  6. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems." in ACM Conference on Computer and Communications Security,  Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500.
  7. D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology — CRYPTO 2001, ser. Lecture Notes in Computer Science, J. Kilian, Ed. Springer Berlin Heidelberg, 2001, vol. 2139, pp. 213–229.
  8. R. D. Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication." in ACM Symposium on Information, Computer and Communications Security, H. Y. Youm and Y. Won, Eds. ACM, 2012, pp. 81–82.
  9. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote data checking using provable data possession," ACM Trans.  Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, 2011.
  10. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proceedings of the 4th International Conference on  Security and Privacy in Communication Networks, ser. SecureComm ’08. New York, NY, USA: ACM, 2008, pp. 9:1–9:10.
  11. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proceedings of the 16th ACM Conference on Computer and   Communications Security, ser. CCS ’09. New York, NY, USA: ACM, 2009, pp. 213–222.
Publication Details
  Published in : Volume 2 | Issue 2 | March-April 2016
  Date of Publication : 2016-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 114-117
Manuscript Number : IJSRST162240
Publisher : Technoscience Academy
PRINT ISSN : 2395-6011
ONLINE ISSN : 2395-602X
Cite This Article :
Jeyasankar.G, Deepanraj.E, Ramakrishnan.R, "Detecting File Repeatation Using Convergent Encryption Scheme On Cloud", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 2, Issue 2, pp.114-117, March-April-2016.
Journal URL : http://ijsrst.com/IJSRST162240

Article Preview