Escolar Documentos
Profissional Documentos
Cultura Documentos
INTRODUCTION
1
Fig 1. Cloud architecture and services
2
cloud take focal points of both open cloud and private cloud. Open cloud and
private cloud are available in the half and half cloud structural engineering. When any
client forward solicitation to people in general cloud to get to the data he have to
present his data to the private cloud then private cloud will give a record token and
client can get the notifications to the document lives on the general population cloud.
We have utilized a half and half cloud construction modeling as a part of proposed.
We have to need to mind the file name in record information duplication and
information DE duplication is checked at the square level. On the other hand, client
needs to recover his information or download the information record he have to
download both of the document from the cloud server this will prompts perform the
operation on the same record this abuses the security of the distributed storage.
3
2. LITERATURE SURVEY
Different types or individual data now store extensive amounts of individual and
corporate information on tablets or home PCs. By doing this type of work it is helpless
against burglary or equipment disappointment. Ordinary ideal arrangements are not
appropriate to this environment, and reinforcement administrations are every now and
again deficient.
4
Fig 3. System diagram
This system depicts a calculation which exploits the information which is basic
between clients to build the pace of reinforcements, and decrease the capacity
necessities. This calculation bolsters customer end per-client encryption which is
essential for classified individual information. It likewise underpins a one of a kind
element which permits prompt location of normal sub trees, dodging the need to
question the reinforcement framework for each document. It means the same data uses
by different users have take large space and reduce the performance of your PC. We
portray a model usage of this calculation for Apple Operating System X, and present
an investigation of the potential viability, utilizing genuine information acquired from
an arrangement of ordinary clients. At last, we talk about the utilization of this model
in conjunction with remote distributed storage, and present an investigation of the
common place cost reserve funds.
5
(C) Secure Deduplication with Efficient and Reliable Convergent Key
Management.
Deduplication is a system for taking out copy duplicates of information, and has
been broadly utilized as a part of distributed storage to decrease storage space and
transfer data transfer capacity. Promising as it perhaps, an emerging test is to perform
secure deduplication in distributed storage. Albeit joined encryption has been widely
received for secure deduplication, a basic problem of making focalized encryption
down to earth is to productively and dependably deal with an immense number of
united keys. This system makes the first endeavor to formally notify the issue of
accomplishing effective and dependable key administration in secure deduplication.
Firstly we introduce a pattern approach in which every client holds an autonomous
expert key for scrambling the aim keys and outsourcing them to the cloud.
6
de-duplication, permitting an aggressor to access self-assertive size records of
different clients in view of a few hash marks of these documents.
All the more particularly, an aggressor who knows the hash mark of a record can
persuade the capacity advantage that it possesses that document, henceforth the server
lets the assailant download the whole record. (In parallel to our work, a subset of these
assaults was as of late presented in the wild regarding the Dropbox record
synchronization administration.) To overcome of this problem, we present the thought
of verifications of-possession (PoWs), which lets a customer effectively present to a
server that that the customer holds a document, as opposed to simply some short data
about it. We formalize the concept of evidence of-proprietorship, under thorough
security definitions, and thorough productivity prerequisites of Petabyte scale
stockpiling frameworks. We then present arrangements in view of particular
encodings and Merkle trees, and investigate their security. We actualized one
variation of the plan. Our execution estimations show that the plan causes just a few
overhead contrasted with guileless customer side deduplication.
7
Figure 5. Reverse duplication example
8
(F) Private Data Deduplication Protocols in Cloud Storage
When a user uploads data that already exist in the cloud storage, the user
should be deterred from accessing the data that were stored before he obtained the
ownership by uploading it (backward secrecy)2. These dynamic ownership changes
may occur very frequently in a practical cloud system, and thus, it should be properly
managed in order to avoid the security degradation of the cloud service. In the former
approach, most of the existing schemes have been proposed in order to perform a
PoW process in an efficient and robust manner, since the hash of the file, which is
treated as a “proof” for the entire file, is vulnerable to being leaked to outside
adversaries because of its relatively small size. a data owner uploads data that do not
already exist in the cloud storage, he is called an initial uploader; if the data already
exist, called a subsequent uploader since this implies that other owners may have
uploaded the same data previously, he is called a subsequent uploader.
9
Disadvantages of Existing System
User deduplication on the client-side, cannot generate a new tag when they update the
file. In this situation, the dynamic Ownerships would fail. As a summary, existing
dynamic Ownerships cannot be extended to the multi-user environment. Whenever
data is transformed, concerns arise about potential loss of data. By definition, data
deduplication systems store data differently from how it was written. As a result, users
are concerned with the integrity of their data. One method for deduplicating data relies
on the use of cryptographic hash functions to identify duplicate segments of data. If
two different pieces of information generate the same hash value, this is known as a
collision. The probability of a collision depends upon the hash function used, and
although the probabilities are small, they are always non zero.
2.3 MODULES
i).Data Provider
ii).Cloud
iii).Deduplicaion
iv).Attribute Authority
Data Provider
Data provider uploading file to cloud with tag , label and security key , the
proposed scheme guarantees data integrity against any tag inconsistency attack. Thus,
security is enhanced in the proposed scheme.
Cloud Storage
Secure Deduplication with the goal of saving storage spacefor cloud storage
services, Douceur et al the first solution for balancing confidentiality and efficiency in
10
performing deduplication called convergent encryption, where a message is encrypted
under a message-derived key so that identical plaintexts are encrypted to the same
ciphertexts. In this case, if two users upload the same file, the cloud server can discern
the equal ciphertexts and store only one copy of them. which may violate the privacy
of the data if the cloud server cannot be fully trusted . This is a client who owns data,
and wishes to upload it into the cloud storage to save costs. A data owner encrypts the
data and outsources it to the cloud storage with its index information, that is, a tag.
Deduplication
Attribute Authority
The AA issues every user a decryption keyassociated with user set of attributes
At the user side, each user can download an item, and decrypt the ciphertext with the
attribute-based private key generated by the AA if this user’s attribute set satisfies the
access structure.
11
2.5 SPECIFICATION
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
12
3. SYSTEM DESIGN
13
about the organizing of process or data about whether strategy will work in game-plan
or in parallel.
DFD SYMBOLS
In the DFD, there are four symbols
A square defines a source or destination of system data.
An arrow identifies data flow. It is the pipeline through which the information
flows.
A circle represents a process that transforms incoming data flow into outgoing
data flow.
14
Fig : Data Flow Diagram
The unified modeling language is the standard language for writing software
blueprints. The UML is a language for:
•Visualizing
•Specifying
•Constructing
•Documenting the artifacts of a software intensive system
The UML is a dialect which gives vocabulary and the guidelines to joining
words in that vocabulary with the end goal of correspondence. A displaying is a
dialect whose vocabulary and the guidelines concentrate on the theoretical and
physical portrayal of the system.UML is a method for imagining a product program
utilizing a gathering of graphs. The documentation has advanced the work of Grady
Booch, James Rumbaugh, Ivar Jacobson and the Rational Software Corporation to be
utilized for question situated outline.
15
3.3.1 USE CASE DIAGRAM
A Use case outline is the UML is a sort of conduct graph characterized by and made
by a use case analysis. The fundamental motivation behind a use case chart is to
indicate what framework capacities are performed for which on-screen character.
Utilize case chart demonstrates an arrangement of utilization cases and performing
artists and their connections. They address the static outline perspective of the
framework. They are particularly essential in sorting out and demonstrating the
practices of a framework.
16
3.3.2 CLASS DIAGRAM
17
3.3.3 SEQUENCE DIAGRAM
18
3.3.4 COLLABORATION DIAGRAM
19
4. IMPLEMENTATION
SYSTEM ARCHITECTURE
DATA PROVIDER
In this module, initially the data owner has to register to the cloud server and get
authorized. After the authorization from cloud data owner will encrypt and add file to
the cloud server where in after the addition of file data owner requests the content key and
the master secret key to the authority for the file he uploaded ,only after the keys
generated the file is uploaded to the cloud server. After the uploading of the file the data
owner will have to provide download and the search permission for individual file for the
users to perform search and download.
20
CLOUD SERVER
The cloud server manages a cloud to provide data storage service. Data owners
encrypt their data files and store them in the cloud for sharing with cloud End users. To
access the shared data files users will request the permission of content key and the MSK
master secret key. And the cloud will provide the permission and also views all the
transactions and attackers related to the files.
ATTRIBUTE AUTHORITY
Authority generates the content key and the secret key requested by the end user.
Authority can view all files with the content key and master secret key generated with the
corresponding data owner details of the particular file.
USER
User has to register and login for accessing the files in the cloud. User is
authorized by the cloud to verify the registration. User has to request for the MSK master
secret key and content key to download the file. User can only download and search the
file if the data owner of the particular file has provided the permissions.
21
5. CODING
Authority Login.html
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<title>Authority Login</title>
<link href="./Authority Login_files/style.css" rel="stylesheet" type="text/css">
<script type="text/javascript" src="./Authority Login_files/cufon-
yui.js.download"></script>
<style type="text/css">
cufon {
text-indent: 0!important;
}
@media screen,
projection {
cufon {
display: inline!important;
display: inline-block!important;
position: relative!important;
vertical-align: middle!important;
font-size: 1px!important;
line-height: 1px!important;
}
cufon cufontext {
display: -moz-inline-box!important;
display: inline-block!important;
width: 0!important;
22
height: 0!important;
overflow: hidden!important;
text-indent: -10000in!important;
}
cufon canvas {
position: relative!important;
}
}
@media print {
cufon {
padding: 0!important;
}
cufon canvas {
display: none!important;
}
}
</style>
<script type="text/javascript" src="./Authority
Login_files/arial.js.download"></script>
<script type="text/javascript" src="./Authority
Login_files/cuf_run.js.download"></script>
<style type="text/css">
<!-- .style24 {
color: #FF0000;
font-size: 24px;
}
.style25 {
color: #FF0000
}
-->
</style>
23
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
<h1><a
href="http://localhost:8081/Attribute_basedStorageSupport/index.html"
class="style24"><cufon class="cufon cufon-canvas" alt="Attribute-Based "
style="width: 173px; height: 24px;"><canvas width="224" height="32" style="width:
224px; height: 32px; top: -5px; left: -16px;"></canvas><cufontext>Attribute-Based
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="Storage "
style="width: 91px; height: 24px;"><canvas width="143" height="32" style="width:
143px; height: 32px; top: -5px; left: -16px;"></canvas><cufontext>Storage
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="Supporting "
style="width: 123px; height: 24px;"><canvas width="175" height="32" style="width:
175px; height: 32px; top: -5px; left: -16px;"></canvas><cufontext>Supporting
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="Secure " style="width:
83px; height: 24px;"><canvas width="135" height="32" style="width: 135px; height:
32px; top: -5px; left: -16px;"></canvas><cufontext>Secure
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="Deduplication "
style="width: 153px; height: 24px;"><canvas width="204" height="32" style="width:
204px; height: 32px; top: -5px; left: -16px;"></canvas><cufontext>Deduplication
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="of " style="width:
27px; height: 24px;"><canvas width="79" height="32" style="width: 79px; height:
32px; top: -5px; left: -16px;"></canvas><cufontext>of </cufontext></cufon><cufon
class="cufon cufon-canvas" alt="Encrypted " style="width: 115px; height:
24px;"><canvas width="167" height="32" style="width: 167px; height: 32px; top: -
5px; left: -16px;"></canvas><cufontext>Encrypted </cufontext></cufon><cufon
class="cufon cufon-canvas" alt="Data " style="width: 58px; height: 24px;"><canvas
width="109" height="32" style="width: 109px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>Data </cufontext></cufon><cufon class="cufon cufon-
canvas" alt="in " style="width: 26px; height: 24px;"><canvas width="77"
24
height="32" style="width: 77px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>in </cufontext></cufon><cufon class="cufon cufon-
canvas" alt="Cloud" style="width: 63px; height: 24px;"><canvas width="108"
height="32" style="width: 108px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>Cloud</cufontext></cufon></a><a
href="http://localhost:8081/Attribute_basedStorageSupport/index.html"></a></h1>
</div>
<div class="clr"></div>
<div class="menu_nav">
<ul>
<li class="active"><a
href="http://localhost:8081/Attribute_basedStorageSupport/index.html">Home</a></l
i>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DO_Login.jsp">Data
Owner </a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DU_Login.jsp">User</a>
</li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/A_Login.jsp">Authority<
/a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/C_Login.jsp">Cloud</a>
</li>
</ul>
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
25
<h2><span><cufon class="cufon cufon-canvas" alt="Authentication "
style="width: 216px; height: 24px;"><canvas width="268" height="32" style="width:
268px; height: 32px; top: -5px; left: -16px;"></canvas><cufontext>Authentication
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="Login " style="width:
82px; height: 24px;"><canvas width="134" height="32" style="width: 134px; height:
32px; top: -5px; left: -16px;"></canvas><cufontext>Login
</cufontext></cufon></span></h2>
<p><img src="./Authority Login_files/Login.jpg" width="176"
height="138"></p>
<form
action="http://localhost:8081/Attribute_basedStorageSupport/A_Authentication.jsp"
method="post" id="leavereply">
<p class="style25"><strong>Name (required)
26
<h2 class="star"><cufon class="cufon cufon-canvas" alt="Menu"
style="width: 71px; height: 24px;"><canvas width="112" height="32" style="width:
112px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>Menu</cufontext></cufon></h2>
<ul class="sb_menu">
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DU_Login.jsp">User</a>
</li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/C_Login.jsp">Cloud</a>
</li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/A_Login.jsp">Authority<
/a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DO_Login.jsp">Data
Owner</a></li>
</ul>
</div>
<div class="gadget"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="footer">
<div class="footer_resize">
<p class="lf"> </p>
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div align="center"></div>
27
</body>
</html>
Cloud Login.html
<head>
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252">
<title>Cloud Login</title>
@media screen,
projection {
cufon {
28
display: inline!important;
display: inline-block!important;
position: relative!important;
vertical-align: middle!important;
font-size: 1px!important;
line-height: 1px!important;
}
cufon cufontext {
display: -moz-inline-box!important;
display: inline-block!important;
width: 0!important;
height: 0!important;
overflow: hidden!important;
text-indent: -10000in!important;
}
cufon canvas {
position: relative!important;
}
}
@media print {
cufon {
padding: 0!important;
}
cufon canvas {
display: none!important;
}
}
</style>
29
<script type="text/javascript" src="./Cloud
Login_files/arial.js.download"></script>
<script type="text/javascript" src="./Cloud
Login_files/cuf_run.js.download"></script>
<style type="text/css">
<!-- .style32 {
color: #FF0000;
font-size: 24px;
}
.style33 {
color: #FF0000
}
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
<h1><a
href="http://localhost:8081/Attribute_basedStorageSupport/index.html"
class="style32"><cufon class="cufon cufon-canvas" alt="Attribute-Based
" style="width: 173px; height: 24px;"><canvas width="224" height="32"
style="width: 224px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>Attribute-Based
30
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="Storage "
style="width: 91px; height: 24px;"><canvas width="143" height="32"
style="width: 143px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>Storage </cufontext></cufon><cufon
class="cufon cufon-canvas" alt="Supporting " style="width: 123px;
height: 24px;"><canvas width="175" height="32" style="width: 175px;
height: 32px; top: -5px; left: -16px;"></canvas><cufontext>Supporting
</cufontext></cufon><cufon class="cufon cufon-canvas" alt="Secure "
style="width: 83px; height: 24px;"><canvas width="135" height="32"
style="width: 135px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>Secure </cufontext></cufon><cufon
class="cufon cufon-canvas" alt="Deduplication " style="width: 153px;
height: 24px;"><canvas width="204" height="32" style="width: 204px;
<href="http://localhost:8081/Attribute_basedStorageSupport/index.html"
></a></h1>
</div>
<div class="clr"></div>
<div class="menu_nav">
<ul>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/index.html">
Home</a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DO_Login.js
p">Data Owner </a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DU_Login.js
p">User</a></li>
31
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/A_Login.jsp"
>Authority</a></li>
<li class="active"><a
href="http://localhost:8081/Attribute_basedStorageSupport/C_Login.jsp"
>Cloud</a></li>
</ul>
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
<h2><cufon class="cufon cufon-canvas" alt="Cloud "
style="width: 91px; height: 24px;"><canvas width="143" height="32"
style="width: 143px; height: 32px; top: -5px; left: -
16px;"></canvas><cufontext>Cloud </cufontext></cufon><cufon
class="cufon cufon-canvas" alt="login" style="width: 75px; height:
24px;"><canvas width="116" height="32" style="width: 116px; height:
32px; top: -5px; left: -
16px;"></canvas><cufontext>login</cufontext></cufon></h2>
<p align="center"><img src="./Cloud
Login_files/CLogin.jpg" width="173" height="121"></p>
<form
action="http://localhost:8081/Attribute_basedStorageSupport/C_Authenti
cation.jsp" method="post" id="leavereply">
32
<p class="style33"> Name
(required)
33
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DU_Login.js
p">User</a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/C_Login.jsp"
>Cloud</a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/A_Login.jsp"
>Authority</a></li>
<li><a
href="http://localhost:8081/Attribute_basedStorageSupport/DO_Login.js
p">Data Owner </a></li>
</ul>
</div>
<div class="gadget"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="footer">
<div class="footer_resize">
<p class="lf"> </p>
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
</body>
</html>
34
7. SCREENSHOTS
35
fig 2. Records owner registration page
36
Fig 3. Data Owner Login
37
fig 5. Statistics proprietor including files
38
fig 7. Statistics owner requesting keys
39
fig 10. authority login
40
fig 12. Admin viewing documents
41
CONCLUSIONS
Attribute-based encryption (ABE) has been widely used in cloud computing where data
providers outsource their encrypted data to the cloud and can share the data with users
possessing specified credentials. On the other hand, deduplication is an important
technique to save the storage space and network bandwidth, which eliminates duplicate
copies of identical data. However, the standard ABE systems do not support secure
deduplication, which makes them costly to be applied in some commercial storage
services. In this paper, we presented a novel approach to realize an attribute-based storage
system supporting secure deduplication. Our storage system is built under a hybrid cloud
architecture, where a private cloud manipulates the computation and a public cloud
manages the storage.
The private cloud is provided with a trapdoor key associated with the
corresponding ciphertext, with which it can transfer the ciphertext over one access policy
into ciphertexts of the same plaintext under any other access policies without being aware
of the underlying plaintext. After receiving a storage request, the private cloud first
checks t he validity o f the uploaded item through the attached proof. If the proof is valid,
the private cloud runs a tag matching algorithm to see whether the same data underlying
the ciphertext has been stored. If so, whenever it is necessary, it regenerates the ciphertext
into a ciphertext of the same plaintext over an access policy which is the union set of both
access policies.
The proposed storage system enjoys two major advantages. Firstly, it can be used
to confidentially share data with other users by specifying an access policy rather than
sharing the decryption key. Secondly, it achieves the standard notion of semantic security
while existing deduplication schemes only achieve it under a weaker security notion.
42
REFERENCES
[1] D. Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress
Publishing/Elsevier,2014.[Online].Available:http://www.elsevier.com/books/cloud-
storageforensics/quick/978-0-12-419970-5
[2] K. R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud cryptography: Theory, practice
and future research directions,” Future Generation Comp. Syst., vol. 62, pp. 51–53, 2016.
[3] K. R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud forensics: State-of-the-art
and future directions,” Digital Investigation, vol. 18, pp. 77–78, 2016.
[4] Y. Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo, “Cloud based data
sharing with fine-grained proxy re-encryption,” Pervasive and Mobile Computing, vol.
28, pp. 122–134, 2016.
[5] D. Quick and K. R. Choo, “Google drive: Forensic analysis of data remnants,” J.
Network and Computer Applications, vol. 40, pp. 179– 193, 2014.
[6] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in
Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory
and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005,
Proceedings, ser. Lecture Notes in Computer Science, vol. 3494. Springer, 2005, pp. 457–
473.
[7] B. Zhu, K. Li, and R. H. Patterson, “Avoiding the disk bottleneck in the data domain
deduplication file system,” in 6th USENIX Conference on File and Storage Technologies,
FAST 2008, February 26- 29, 2008, San Jose, CA, USA. USENIX, 2008, pp. 269–282.
[8] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure
deduplication,” in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual
International Conference on the Theory and Applications of Cryptographic Techniques,
Athens, Greece, May 26-30, 2013. Proceedings, ser. Lecture Notes in Computer Science,
vol. 7881. Springer, 2013, pp. 296–312.
[9] M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, “Message-locked
encryption for lock-dependent messages,” in Advances in Cryptology - CRYPTO 2013 -
33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013.
Proceedings, Part I, ser. Lecture Notes in Computer Science, vol. 8042. Springer, 2013,
pp. 374–391.
43
[10] S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for
deduplicated storage,” in Proceedings of the 22th USENIX Security Symposium,
Washington, DC, USA, August 14-16, 2013. USENIX Association, 2013, pp. 179–194.
[11] M. Bellare and S. Keelveedhi, “Interactive message-locked encryption and secure
deduplication,” in Public-Key Cryptography – PKC 2015 - 18th IACR International
Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
USA, March 30 – April 1, 2015, Proceedings, ser. Lecture Notes in Computer Science,
vol. 9020. Springer, 2015, pp. 516–538.
[12] S. Bugiel, S. N¨ urnberger, A. Sadeghi, and T. Schneider, “Twin clouds: Secure
cloud computing with low latency - (full version),” in Communications and Multimedia
Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium,
October 19- 21,2011. Proceedings, ser. Lecture Notes in Computer Science, vol. 7025.
Springer, 2011, pp. 32–44.
[13] S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of interactive
proof-systems (extended abstract),” in Proceedings of the 17th Annual ACM Symposium
on Theory of Computing, May 6-8, 1985, Providence, Rhode Island, USA. ACM, 1985,
pp. 291– 304.
[14] M. Fischlin and R. Fischlin, “Efficient non-malleable commitment schemes,” in
Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology
Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, ser.
Lecture Notes in Computer Science, vol. 1880. Springer, 2000, pp. 413–431.
[15] S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. Syst. Sci., vol.
28, no. 2, pp. 270–299, 1984.
[16] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-
grained access control of encrypted data,” in Proceedings of the 13th ACM Conference
on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober
30 - November 3, 2006, ser. Lecture Notes in Computer Science, vol. 5126. Springer,
2006, pp. 89–98.
[17] R. Ostrovsky, A. Sahai, and B.Waters, “Attribute-based encryption with non-
monotonic access structures,” in Proceedings of the 2007 ACM Conference on Computer
44
and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31,
2007. ACM, 2007, pp. 195–203.
[18] A. B. Lewko and B. Waters, “Unbounded HIBE and attributebased encryption,” in
Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19,
2011. Proceedings, ser. Lecture Notes in Computer Science, vol. 6632. Springer, 2011,
pp. 547–567.
[19] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based
encryption,” in 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May
2007, Oakland, California, USA. IEEE Computer Society, 2007, pp. 321–334.
[20] L. Cheung and C. C. Newport, “Provably secure ciphertext policy ABE,” in
Proceedings of the 2007 ACM Conference on Computer and Communications Security,
CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM, 2007, pp. 456–465.
[21] V. Goyal, A. Jain, O. Pandey, and A. Sahai, “Bounded ciphertext policy attribute
based encryption,” in Automata, Languages and Programming, 35th International
Colloquium, ICALP 2008, Reykjavik
45