A novel approach for Secure Key-Deduplication with IBBE

L.Venkata Lakshmi, R. Anusha

Abstract


We plan a novel client-side deduplication convention named KeyD without such a free key management server by utilizing the identity-based broadcast encryption (IBBE) technique. Clients just collaborate with the cloud service provider (CSP) during the procedure of information transfer and download. Security investigation shows that KeyD guarantees information confidentiality and joined key security, and well ensures the ownership privacy simultaneously.


References


Amazon Web Services, [Online]. Available: https://aws.amazon.com/cn/.

D.A. Sarma, X. Dong, and A. Halevy, Bootstrapping pay-as-you-go data integration systems[C]. ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, Bc, Canada, June. DBLP, 2008:861-874.

J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, Reclaiming Space from Duplicate Files in a Serverless Distributed File System[C]. Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on. IEEE, 2002: 617-624.

S. Ghemawat, H. Gobioff, and S. Leung, The Google File System[M]. SOSP ’03 Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003, 37(5): 29-43.

D. Borthakur, HDFS architecture guide[J]. Hadoop Apache Project, 2008, 53.

J. Li, X. Chen, M. Li, J. Li, P.P.C. Lee, and W. Lou, Secure Deduplication with Efficient and Reliable Convergent Key Management[J]. IEEE transactions on parallel and distributed systems, 2014, 25(6): 16151625.

G.R. Blakley and C.A. Meadows, Security of Ramp Schemes[C]. Crypto. 1984, 84: 242-268.

A.D. Santis and B. Masucci, Multiple Ramp Schemes[J]. IEEE Transactions on Information Theory, 1999, 45(5): 1720-1728.

M. Wen, K. Ota, H. Li, J. Lei, C. Gu, and Z. Su, Secure Data Deduplication with Reliable Key Management for Dynamic Updates in Cpss[J]. IEEE transactions on computational social systems, 2015, 2(4): 137-147.

W. Leesakul, P. Townend, and J. Xu, Dynamic Data Deduplication in Cloud Storage[C]. IEEE, International Symposium on Service Oriented System Engineering. IEEE, 2014:320-325.

F. Rashid, A. Miri, and I. Woungang, A secure data deduplication framework for cloud environments[C]. Tenth International Conference on Privacy, Security and Trust. IEEE Computer Society, 2012:81-87.

M. Bellare, S. Keelveedhi, and T. Ristenpart, Message-Locked Encryption and Secure Deduplication[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2013: 296-312.

M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, Message-Locked Encryption for Lock-Dependent Messages[M]. Advances in CryptologyCCRYPTO 2013. Springer, Berlin, Heidelberg, 2013: 374-391.

M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, Secure Data Deduplication[C]. Proceedings of the 4th ACM international workshop on Storage security and survivability. ACM, 2008: 1-10.

P. Anderson and L. Zhang, Fast and Secure Laptop Backups with Encrypted De-duplication[C]. LISA. 2010.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.