Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage

by Madhuri Kavade, A.C. Lomte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 10
Year of Publication: 2015
Authors: Madhuri Kavade, A.C. Lomte
10.5120/ijca2015906198

Madhuri Kavade, A.C. Lomte . Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage. International Journal of Computer Applications. 126, 10 ( September 2015), 5-9. DOI=10.5120/ijca2015906198

@article{ 10.5120/ijca2015906198,
author = { Madhuri Kavade, A.C. Lomte },
title = { Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 10 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number10/22586-2015906198/ },
doi = { 10.5120/ijca2015906198 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:17:04.050758+05:30
%A Madhuri Kavade
%A A.C. Lomte
%T Secure De-Duplication using Convergent Keys (Convergent Cryptography) for Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 10
%P 5-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One very important challenges of today’s cloud storage services is that the management of the ever-increasing amount of data. To create data management scalable, de-duplication has been a widely known technique to condense space for storing and transfer information measure in cloud storage. Rather than keeping multiple data copies with an equivalent content, de-duplication eliminates redundant data by keeping just one physical copy and referring different redundant data to it copy. Convergent Encryption, additionally called content hash keying, could be a cryptosystem that produces identical ciphertext from identical plaintext files. Data de-duplication could be a technique for eliminating duplicate copies of data, and has been wide employed in cloud storage to scale back space for storing and transfer information measure. Promising because it is, associate degree arising challenge is to perform secure de-duplication in cloud storage. Currently daily the foremost arising challenge is to perform secure de-duplication in cloud storage. Though Convergent Encryption has been extensively adopted for secure de-duplication, a essential issue of creating Convergent Encryption sensible is to with efficiency and dependably manage a large range of convergent keys. we have a tendency to initial introduce a baseline approach during which file level de-duplication is performed and it doesn't support on-line approach. For that purpose the current context have a tendency to formally address the matter of achieving economical and reliable key management in secure de-duplication. Within the planned design Dupkey, users don’t ought to manage any keys on their own. It implements de-duplication at block level and provides a lot of security. Dupkey is on-line approach and supply de-duplication and reduces DB size on cloud.

References
  1. J. Li, X. Chen, M. Li, J. Li, P. Lee, andW. Lou. Secure De-duplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2014.
  2. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 6, pp. 547-567, May 2010
  3. W. Wang, Z. Li, R. Owens, and B. Bhargava, Secure and Efficient Access to Outsourced Data, in Proc. ACM CCSW, Nov. 2007, pp. 66-66.
  4. A. Yun, C. Shi, and Y. Kim, On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage, in Proc. ACM CCSW, Nov. 2007, pp. 67-76.
  5. J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer,Reclaiming Space from Duplicate Files in a Serverless Distributed File System, in Proc. ICDCS, 2002, pp. 69-624
  6. M. Bellare, S. Keelveedhi, and T. Ristenpart, Message-Locked Encryption and Secure De-duplication, in Proc. IACR Cryptology ePrint Archive, 208, pp. 276-32208:63
  7. J. Gantz and D. Reinsel, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, Biggest Growth in the Far East, Dec. 208. [Online]. Available: http://www.emc.com/collateral/analystreports/ idc-the-digitaluniverse- in-2020.pdf.
  8. D. Harnik, B. Pinkas, and A. Shulman-Peleg, Side Channels in Cloud Services: De-duplication in Cloud Storage, IEEE Security Privacy, vol. 8, no. 6, pp. 40-47, Nov./Dec. 2010.
  9. M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space, in Proc. USENIX Security, 2010, p. 5.
  10. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, Proofs of Ownership in Remote Storage Systems, in Proc. ACM Conf. Comput. Commun. Security, Y. Chen, G. Danezis, and V. Shmatikov, Eds., 2010, pp. 491-500.
  11. A.D. Santis and B. Masucci, Multiple Ramp Schemes, IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1720-1728, July 1999.
  12. A. Shamir, How to Share a Secret, Commun. ACM, vol. 22, no. 11,pp. 612-613, 1979
  13. S. Kamara and K. Lauter, Cryptographic Cloud Storage, in Proc. Financial Cryptography: Workshop Real-Life Cryptography Protocols Standardization, 2010, pp. 16-147.
Index Terms

Computer Science
Information Sciences

Keywords

De-duplication convergent encryption convergent key cloud Storage.