Assure Deduplication of Encrypted Data in Cloud Using Attribute Based Storage System

Authors(2) :-Syeda Asma, Mrs. ShashiRekha H

In cloud computing where a data providers deploy his/her encrypted data to the cloud service providers using an attribute based encryption(ABE), and shares data with the users or client with a specific attribute or credentials. But the ABE does not support the secure deduplication, which leads to critical for eliminating the same data in order to save the storage space and network bandwidth. In this paper we proposed an attribute based storage system with a assured deduplicaton in a hybrid cloud, in this the public cloud manages the storage system, where the private cloud is responsible for duplicate detection. Compare with existing system this system has two advantages. Firstly, rather then sharing the decryption keys, it uses specific access policies to confidentially share data with users. Secondly it access data confidentiality by using standard notation of semantic security, whereas existing system only achieved by using weak security notations, In addition, we put forth a methodology to change a ciphertext over one access policy into ciphertexts of the same plaintext but under other access policies without disclose the underlying plaintext

Authors and Affiliations

Syeda Asma
Student, M.Tech in CS&E, VTU PG Centre, Mysuru, Karnataka, India
Mrs. ShashiRekha H
Assistant Professor, DoS in CS&E, VTU PG Centre, Mysuru, Karnataka, India

ABE, Storage, Encryptions, ciphertext, plaintext.

  1. D Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress Publishing / Elsevier, 2014.[Online]. Available: http://www.elsevier.com/books/cloud-storageforensics/ quick/978-0-12-419970-5
  2. K R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud cryptography: Theory, practice and future research directions,” FutureGeneration Comp. Syst., vol. 62, pp. 51–53, 2016.
  3. Y Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo, “Cloud based data sharing with fine-grained proxy re-encryption,” Pervasive and Mobile Computing, vol. 28, pp. 122–134, 2016.
  4. A Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3494. Springer, 2005, pp. 457–473.
  5. B Zhu, K. Li, and R. H. Patterson, “Avoiding the disk bottleneck in the data domain deduplication file system,” in 6th USENIXConference on File and Storage Technologies, FAST 2008, February 26- 29, 2008, San Jose, CA, USA. USENIX, 2008, pp. 269–282.
  6. M Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Advances in Cryptology- EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, ser. Lecture Notes in Computer Science, vol. 7881. Springer, 2013, pp. 296–312.
  7. M Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, “Message-locked encryption for lock-dependent messages,” in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, ser. Lecture Notes in Computer Science, vol. 8042. Springer, 2013, pp. 374–391.
  8. S Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013. USENIX Association, 2013, pp. 179–194.
  9. K R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud forensics: State-of-the-art and future directions,” Digital Investigation, vol. 18, pp. 77–78, 2016.
  10. Quick and K. R. Choo, “Google drive: Forensic analysis of data remnants,” J. Network and Computer Applications, vol. 40, pp. 179– 193, 2014.

Publication Details

Published in : Volume 4 | Issue 6 | May-June 2018
Date of Publication : 2018-05-08
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 59-64
Manuscript Number : CSEIT184613
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Syeda Asma, Mrs. ShashiRekha H, "Assure Deduplication of Encrypted Data in Cloud Using Attribute Based Storage System ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.59-64, May-June.2018
URL : http://ijsrcseit.com/CSEIT184613

Follow Us

Contact Us