An Effective Secure Authorized Deduplication in Hybrid Cloud

Atchana Venugopal, M.N.Satish Kumar


A challenging task in cloud is To minimize the quantity of space for storing and save bandwidth. That may be extremely done by using adopting some of the primary information compression methods for removing reproduction copies of repeating knowledge known as information de-duplication, and has been broadly utilized in cloud storage to. To guard the confidentiality of touchy data at the same time aiding de-duplication, the convergent encryption technique has been proposed to encrypt the info earlier than outsourcing. To better protect information safety, this paper makes the primary attempt to formally deal with the trouble of authorized information de-duplication. Different from typical de-duplication methods, the differential privileges of users are additional regarded in duplicate check apart from the info itself. We additionally gift a few new de-duplication constructions helping authorized duplicate investigate in a hybrid cloud structure. Protection analysis demonstrates that our scheme is at ease in phrases of the definitions unique within the proposed safety mannequin. As a proof of idea, we put into effect a prototype of our proposed authorized replica check scheme and conduct experiment-bed experiments utilizing our prototype. We exhibit that our proposed licensed replica investigate scheme incurs minimal overhead in comparison with average operations.


S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002.

P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.

M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296– 312, 2013.

M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology,22(1):1–61, 2009.

M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617–624, 2002.

D. Ferraiolo and R. Kuhn. Role-based access controls. In 15th NIST-NCSC National Computer Security Conf., 1992.

GNU Libmicrohttpd.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491–500. ACM, 2011.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at