Authorized Deduplication of Encrypted data in Cloud

Authors

  • Prof. Milind B. Waghmare  Computer Science and Engineering, Government College of Engineering, Amravati , Maharashtra, India
  • Suhasini V. Padwekar   Computer Science and Engineering, Government College of Engineering, Amravati , Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT2062159

Keywords:

Authorized user, Cloud computing, Data Deduplication, Data privacy, Confidentiality

Abstract

Cloud computing technology is rapidly developing nowadays. The number of files stored and processed is increasing per day. This increase brings severe challenge in requirement of space, processing power and bandwidth. More than half of the data generated in the cloud is duplicate data. To handle this data, deduplication technique is used which eliminates duplicate copies of data. This removal of duplicate data increases storage efficiency and reduce cost. In this paper, we propose secure role re-encryption system which allows authorized deduplication of data and also maintains privacy of data. This system is based on convergent algorithm and re-encryption algorithm that encrypts the user data and assign role keys to each user. This system grants privileges to users in order to maintain ownership of each user so that authorized users can access the data efficiently. In this system management center is introduced where the file is being encrypted and role keys are generated to handle authorized requests. Role keys are stored in Merkle hash tree which maps relationship between roles and keys. Authorized user who has particular role-encryption key can access the file. Convergent algorithm and role re-encryption algorithm allows access of specific file without leakage of private data. Dynamic updating of user privileges is achieved.

References

  1. Jinbo xiong, Yuanyuan zhang, Shaohua tang, Ximengl liu and Zhiqiang Yao, "Secure encrypted data with authorized deduplication in cloud" IEEE Access, vol. 7, pp. 75090–75104, Jun.2019.
  2. Hui cui , Robert H. deng, Yingjiu Li , Member and Guowei Wu, ‘‘Attribute-based storage supporting secure deduplication of encrypted data in cloud,’’ IEEE transactions on big data, vol. 5, no. 3, July-September 2019.
  3. Hua Ma1 , Ying Xie 1 , Jianfeng Wang2 , Guohua Tian1 , And Zhenhua Liu1, ‘‘Revocable attribute-based encryption scheme with efficient deduplication for e-health systems,’’ Volume 7, 2019.
  4. Jin li, Yan kit li, Xiaofeng chen, Patrick P.C. lee, and Wenjing lou," A hybrid cloud approach for secure authorized deduplication" IEEE transactions on Parallel and Distributed systems,. 2015.
  5. Chen, R., Mu, Y., Yang, G., & Guo, F., ” BL-MLE: Block-level message-locked encryption for secure large file deduplication”, IEEE Transactions on Security, 2015.
  6. Yongjun Zhao and Sherman S. M. Chow," Updatable block-level Message-locked encryption" Proc. IEEE Transaction on Dependable and secure computing, vol. xx, no. y, MAY 2019.
  7. Maozhen Liu, Chao Yang, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren, School of Cyber Engineering, Xidian University, Xi’an, Shaanxi, " Updatable block-level deduplication with dynamic ownership management on encrypted data".
  8. Waghmare, V., & Kapse, S., ”Authorized deduplication: An approach for secure cloud environment, 2016.
  9. Hyungjune shin, Dongyoung koo, Youngjoo shin, and Junbeom hur," Privacy-preserving and updatable block-level data deduplication in cloud storage services" Proc. 2018 IEEE 11th International Conference on Cloud Computing.
  10. Nipun Chhabra and Manju Bala,"A Comparative study of data deduplication strategies," in Proc. 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
  11. Shunrong Jiang , Tao Jiang and Liangmin Wang," Secure and Efficient cloud data deduplication with ownership management" Proc. IEEE Transaction, 2017.
  12. Dapeng Wu, Hang Shi, Honggang Wang, Ruyan Wang, Hua Fang, ‘‘A feature-based learning system for Internet of Things applications,’’ IEEE Internet Things J., vol. 6, no. 2, pp. 1928–1937, Apr. 2019.
  13. J. Xiong, Y. Zhang, X. Li, M. Lin, Z. Yao, and G. Liu, ‘‘RSE-PoW: A role symmetric encryption pow scheme with authorized deduplication for multimedia data,’’ Mobile Netw. Appl., vol. 23, no. 3, pp. 650–663, 2018.
  14. W. Xia, H. Jiang, D. Feng, F. Douglis, P. Shilane, Y. Hua, M. Fu, Y. Zhang, and Y. Zhou, ‘‘A comprehensive study of the past, present, and future of data deduplication,’’ Proc. IEEE, vol. 104, no. 9, pp. 1681–1710, Sep. 2016.
  15. J. Li, C. Qin, P. P. C. Lee, and X. Zhang, ‘‘Information leakage in encrypted deduplication via frequency analysis,’’ in Proc. 47th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw., Jun. 2017, pp. 1–12.
  16. J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, ‘‘Reclaiming space from duplicate files in a serverless distributed file system,’’ in Proc. 22nd Int. Conf. Distrib. Comput. Syst., Jul. 2002, pp. 617–624

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Milind B. Waghmare, Suhasini V. Padwekar , " Authorized Deduplication of Encrypted data in Cloud , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 2, pp.541-546, March-April-2020. Available at doi : https://doi.org/10.32628/CSEIT2062159