Detecting File Repeatation Using Convergent Encryption Scheme On Cloud
Keywords:
Detecting repeatation of data in a cloud is technique of removing duplicate copies of data. It is widely used in cloud to save space and bandwidth. However, single copy of each file stored in cloud server even if many number of users owns that single copy. As a result, the de-duplication technique increases the storage usability while decreasing the reliability. By which the every user encrypt the file before uploading. The confidentiality on data is made by using convergent encryption algorithm, which also detects data repeatation. In convergent encryption scheme a user or data owner derives the key from the file content and encrypts the file with that key. In addition the user generate the tag for that file copy and put it into the data center, such that the tag is used for detecting repeatation of data on cloud.Abstract
Detecting repeatation of data in a cloud is technique of removing duplicate copies of data. It is widely used in cloud to save space and bandwidth. However, single copy of each file stored in cloud server even if many number of users owns that single copy. As a result, the de-duplication technique increases the storage usability while decreasing the reliability. By which the every user encrypt the file before uploading. The confidentiality on data is made by using convergent encryption algorithm, which also detects data repeatation. In convergent encryption scheme a user or data owner derives the key from the file content and encrypts the file with that key. In addition the user generate the tag for that file copy and put it into the data center, such that the tag is used for detecting repeatation of data on cloud.
References
- J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure De-duplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2014.
- S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg,‘‘Proofs of Ownership in Remote Storage Systems,’’ in Proc. ACM Conf. Comput. Commun. Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds., 2011, pp. 491-500.
- J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, "A secure data deduplication scheme for cloud storage," in Technical Report, 2013.
- W. K. Ng, Y. Wen, and H. Zhu, "Private data deduplication protocols in cloud storage." in Proceedings of the 27th Annual ACM Symposium on Applied Computing, S.Ossowski and P. Lecca, Eds.ACM, 2012, pp. 441–446.
- J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615–1625.
- S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems." in ACM Conference on Computer and Communications Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds. ACM, 2011, pp. 491–500.
- D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology — CRYPTO 2001, ser. Lecture Notes in Computer Science, J. Kilian, Ed. Springer Berlin Heidelberg, 2001, vol. 2139, pp. 213–229.
- R. D. Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication." in ACM Symposium on Information, Computer and Communications Security, H. Y. Youm and Y. Won, Eds. ACM, 2012, pp. 81–82.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote data checking using provable data possession," ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, 2011.
- G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ser. SecureComm ’08. New York, NY, USA: ACM, 2008, pp. 9:1–9:10.
- C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS ’09. New York, NY, USA: ACM, 2009, pp. 213–222.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.