Professional Documents
Culture Documents
ABSTRACT
In this paper, we propose a novel server server-side ownership of outsourced data that occur frequently in
deduplication scheme for encrypted data. It allows the a practical
al cloud storage service.
cloud server to control access to outsourced data even
when the ownership changes dynamically by Cloud
loud computing provides scalable, low-cost,
low and
exploiting randomized convergent encryption and location-independent
independent online services ranging from
secure ownership group key distribution. This simple backup services to cloud storage
prevents data
ata leakage not only to revoked users even infrastructures. The fast growth of data volumes
though they previously owned that data, but also to an stored in the cloud storage has led to an increased
honest-but-curious
curious cloud storage server. In addition, demand for techniques for saving disk space and
the proposed scheme guarantees data integrity against network bandwidth. To reduce resource consumption,
any tag inconsistency attack. Thus, security is many cloud storage services, such as Drop box,
enhanced
hanced in the proposed scheme. The efficiency Wuala, Mozy, and Google Drive, employ a
analysis results demonstrate that the proposed scheme deduplication technique, where the cloud server stores
is almost as efficient as the previous schemes, while only a single copy of redundant data and provides
the additional computational overhead is negligible. links to the copy instead of storing other actual copies
of that data, regardless of how many clients ask to
I. INTRODUCTION store the data. The savings are significant, and
In cloud storage services, deduplication technology is reportedly, business applications can achieve disk and
a
commonly used to reduce the space and bandwidth bandwidth savings of more than 90%. However, from
requirements of services by eliminating redundant a security perspective, the shared usage of users’ data
data and storing only a single copy of them. raises a new challenge
Deduplication is most effective when multiple users
outsource
rce the same data to the cloud storage, but it II. LITERATURE SURVEY
raises issues relating to security and ownership. Proof
of ownership schemes allow any owner of the same A Dynamic Layering Scheme of Multicast Key
data to prove to the cloud storage server that he owns Management Group key management is a difficult
the data in a robust way. However, many users are task in implementing large and dynamic secure
likely to encrypt their data before outsourcing them to multicast. In this paper, a new scheme is proposed in
the cloud storage to preserve privacy, but this the basis of in-depth
depth analysis of the requirements of
hampers deduplication because of the randomization the secure multicast and group key management. The
property of encryption. Recently, several scheme is based on the multicast group security
deduplication schemes have been proposed to solve architecture and multicast security group key
this problem
blem by allowing each owner to share the management architecture proposed by IETF. This
same encryption key for the same data. However, scheme constructs group key based on pairings and
most of the schemes suffer from security flaws, since distributes the group key using HSAH function
they do not consider the dynamic changes in the polynomial, and manages group key making use of
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2274
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Registration and Login: In this process, new user user is checked and the user request is sent for
registers the details and gets the username and processing regarding whether the file is need to be
password for further process. Using Username and uploaded or not to upload based on whether the file is
Password user login into Group. Group generate key already existing or not.
for the valid user and process inside the group under
the valid key. VII. DATA FLOW DIAGRAM
VIII. RESULTS
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2275
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
The figure-3 shows the beginning page of the project The figure-6 shows the uploading dialog box. Here
where the user is provided with choice of either the user has to choose the file that he wants to upload
registration for the new user or the login of the and also select the path and then confirm and then
already previously registered user. click on the hash.
CONCLUSION
In this paper, we proposed an efficient and privacy
preserving big data deduplication in cloud storage.
We then analyzed the security of our proposed
scheme and demonstrated that it achieves improved
privacy preserving, accountability and data
Figure-5: Encryption page for the newly uploaded availability, while resisting brute-force attacks. Future
file. research includes extending the proposed scheme to
The figure-5 shows the encryption page for the fie fully protect the duplicate information from
where the file that is need to be encrypted is chosen disclosure, even by malicious data providers, without
and then the encrypting of the file will be carried out affecting the capability to perform data deduplication.
when the key is known and then the file will be
encrypted. REFERENCES
1. J. Xu, E. Jhang, and hu, “Leakage-resilient client-
side deduplication of encrypted data in cloud
storage,” ePrint, IACR,
http://eprint.iacr.org/2011/538.
2. A Dynamic Layering Scheme of Multicast Key
Management : FAN, PING, KUAN AND MING
3. Tree-based Group Key Agreement (2003): KIM,
PERRIG AND TSUDIK
4. Energy and Communication Efficient Group Key
Management Protocol for Hierarchical Sensor
Figure-6: Uploading page for the file.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2276
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Networks(2006):PANJA, MADRIA AND lock-dependent messages,” in Advances in
BHARGAVE Cryptology - CRYPTO 2013 - 33rd Annual
Cryptology Conference, Santa Barbara, CA, USA,
5. An Efficient Hierarchical Group Key
August 18-22, 2013. Proceedings, Part I, 2013, pp.
Management Protocol for Mobile Ad-Hoc
374–391. [Online]. Available:
Networks (2009):DAWOOD, MNENEY,
http://dx.doi.org/10.1007/ 978-3-642-40041-4 21
AGHDASI AND DAWOUD
9. Y. Zhou, D. Feng, W. Xia, M. Fu, F. Huang, Y.
6. M. Bellare, S. Keelveedhi, and T. Ristenpart,
Zhang, and C. Li, “Secdep: A user-aware efficient
“Message-locked encryption and secure
fine-grained secure deduplication scheme with
deduplication,” in Advances in Cryptology -
multi-level key management,” in IEEE 31st
EUROCRYPT 2013, 32nd Annual International
Symposium on Mass Storage Systems and
Conference on the Theory and Applications of
Technologies, MSST 2015, Santa Clara, CA,
Cryptographic Techniques, Athens, Greece,May
USA, May 30 - June 5, 2015, 2015, pp. 1–14.
26-30, 2013. Proceedings, 2013, pp. 296–312.
[Online]. Available:
[Online]. Available:
http://dx.doi.org/10.1109/MSST.2015.7208297
http://dx.doi.org/10.1007/978-3-642-38348-9 18
10. Dropbox, http://www.dropbox.com/.
7. S. Keelveedhi, M. Bellare, and T. Ristenpart,
“Dupless: Server-aided encryption for 11. Wuala, http://www.wuala.com/.
deduplicated storage,” in Proceedings of the 22th
12. Mozy, http://www.mozy.com/.
USENIX Security Symposium, Washington, DC,
USA, August 14-16, 2013, 2013, pp. 179–194. 13. Google Drive, http://drive.google.com.
[Online]. Available: 14. IDC, “Executive summary: Data growth, business
https://www.usenix.org/conference/ opportunities, and the it imperatives,,”
usenixsecurity13/technical- http://www.emc.com/leadership/digital-universe/
sessions/presentation/bellare 2014iview/executive-summary.htm, 2014.
8. M. Abadi, D. Boneh, I. Mironov, A. Raghunathan,
and G. Segev “Message-locked encryption for
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2277