Escolar Documentos
Profissional Documentos
Cultura Documentos
Attribute-Based
Based Storage Sup
Supporting
porting Secure Deduplication of
Encrypted Data in Cloud
ABSTRACT
Cloud computing offers a new way of service Cloud computing schemes presented focus on
provision by re-arranging
arranging various resources over the warehoused
rehoused data, where the outsourced data is kept
Internet. The most important and popular cloud unchanged over remote servers In cloud data storage
service is data storage. In order to preserve the system, users store their data in the cloud and No
privacy of data holders, data are often stored in cloud longer possess the data locally. Thus, the correctness
in an encrypted form. However, encrypte encrypted data and availability of the multiple data files being stored
introduce new challenges for cloud data on the distributed cloud servers must be guaranteed.
deduplication, which becomes crucial for big data In existing system, brute-force
force attack used to avoid
storage and processing in cloud. Traditional multiple copies of dynamic data stored in cloud.
deduplication schemes cannot work on encrypted When verifying multiple data copies, the overall
data. Existing solutions of encrypted data system integrity check fails if there are one
on or more
deduplication suffer from m security weakness. They corrupted copies. This project propose History Aware
cannot flexibly support data access control and Rewriting (HAR) algorithm to avoid de-duplicate
de
revocation. Therefore, few of them can be readily encrypted data stored in cloud based on ownership
deployed in practice. In this paper, we propose a challenge and proxy re-encryption.
encryption. It integrates cloud
scheme to deduplicate encrypted data stored in cloud data deduplication with access control. Propose a
based on ownership challenge and proxy re re- scheme based on data owner-ship
ship challenge and Proxy
encryption. It integrates cloud data deduplication with Re-Encryption
Encryption (PRE) to manage encrypted data
access control. We evaluate its performance based on storage with deduplication.aim to solve the issue of
extensive analysis and computer simulations. The deduplication in the situation where the data holder is
results show the superior efficiency and effectiveness not available or difficult to get involved.
involv In this
of the scheme for potential practical
actical deployment, method using double encryption key for encrypted
especially for big data deduplication in cloud storage. data stored in cloud. First the data owner provide the
secret key to data user then authorized party (AP)
Keywords: deduplication, re-encryption,
encryption, potential
send the secret key to data owner. Both AP key and
practical deployment
private key generate the encrypted key that key using
INTRODUCTION for encryption. AES algorithm using the encrypt
content stored in cloud.
The most important and popular cloud service is data
storage service. Cloud users upload personal or
confidential
fidential data to the data center of a Cloud Service
Provider (CSP) and allow it to maintain these data.
RELATED WORK
DupLESS: Server-Aided Encryption for Deduplicated
Storage. By looking the example Dropbox, Mozy, and
others perform deduplication to spare space by just
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 253
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
putting away one duplicate of every document or file sharing plan and show that Dekey brings about
transferred. Should customers routinely scramble their restricted overhead in reasonable situations
documents, be that as it may, funds are lost.
Messagebolted encryption (the most unmistakable CONCLUSION
appearance of which is concurrent encryption) certify Here we provided reason that our proposed
this strain. In any case it is intrinsically subject to framework information DE duplication of record is
savage power assaults that can recoup records falling done approves way and safely. In this we have
into a known set. We propose a building design that additionally proposed new duplication check system
accedes secure deduplicated stockpiling opposing which produce the token for the private document.
savage power assaults, and acknowledge it in a The information client needs to present the benefit
framework called DupLESS. In DupLESS, customers alongside the united key as a proof of possession. We
encode under message-based keys acquired from a have settled more basic piece of the cloud information
key-server by means of an absent PRF convention. It stockpiling which is just endured by diverse systems.
secures customers to store scrambled information with A proposed routine guarantees the information
a current administration, have the administration duplication safely.
perform deduplication for their advantage, but then
accomplishes solid privacy ensures. We demonstrate FUTURE ENHANCEMENT
that encryption for deduplicated stockpiling can Future work includes efficient data ownership
accomplish execution and space reserve funds near verification, scheme optimization with hardware
that of consuming the stockpiling administration with acceleration at IoT devices for practical deployment,
plaintext information and development of a flexible solution to support
deduplication and data access controlled by either the
Secure Deduplication with Efficient and Reliable data owner or its representative agent.
Convergent Key Management. Deduplication is a
system for taking out copy duplicates of information, REFERENCES
and has been broadly utilized as a part of distributed 1) M. Bellare, S. Keelveedhi, and T. Ristenpart.
storage to decrease storage space and transfer data Dupless: Server aided encryption for deduplicated
transfer capacity. Promising as it perhaps, an storage. In USENIX Security Symposium, 2013.
emerging test is to perform secure deduplication in 2) P. Anderson and L. Zhang. Fast and secure laptop
distributed storage. Albeit joined encryption has been backups with encrypted deduplication. In Proc. of
widely received for secure deduplication, a basic USENIX LISA, 2010.
problem of making focalized encryption down to 3) J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou.
earth is to productively and dependably deal with an Secure deduplication with efficient and reliable
immense number of united keys. This system makes convergent key management. In IEEE
the first endeavor to formally notify the issue of Transactions on Parallel and Distributed Systems,
accomplishing effective and dependable key 2013.
administration in secure deduplication. Firstly we 4) S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-
introduce a pattern approach in which every client Peleg. Proofs of ownership in remote storage
holds an autonomous expert key for scrambling the systems. In Y. Chen, G. Danezis, and V.
aim keys and outsourcing them to the cloud. On the Shmatikov, editors, ACM Conference on
second way, such a standard key administration plan Computer and Communications Security, pages
produces a tremendous number of keys with the 491–500. ACM, 2011.
expanding number of obliges clients and clients to 5) C. Ng and P. Lee. Revdedup: A reverse
dedicatedly secure the expert keys. To this end, we deduplication storage system optimized for reads
propose Dekey , another development in which clients to latest backups. In Proc. of APSYS, Apr 2013.
don't have to deal with any keys all alone however 6) W. K. Ng, Y. Wen, and H. Zhu. Private data
rather safely circulate or transfer the united key shares deduplication protocols in cloud storage. In S.
over different servers. Security examination exhibits Ossowski and P. Lecca, editors, Proceedings of
that Dekey is secure as far as the definitions the 27th Annual ACM Symposium on Applied
determined in proposed security model. As a proof of Computing, pages 441–446. ACM, 2012.
idea, we actualize Dekey utilizing the Ramp mystery
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 254