A novel approach for Secure Key-Deduplication with IBBE

L.Venkata Lakshmi, R. Anusha

Abstract


We plan a novel client-side deduplication convention named KeyD without such a free key management server by utilizing the identity-based broadcast encryption (IBBE) technique. Clients just collaborate with the cloud service provider (CSP) during the procedure of information transfer and download. Security investigation shows that KeyD guarantees information conï¬dentiality and joined key security, and well ensures the ownership privacy simultaneously.


References


Amazon Web Services, [Online]. Available: https://aws.amazon.com/cn/.

D.A. Sarma, X. Dong, and A. Halevy, Bootstrapping pay-as-you-go data integration systems[C]. ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, Bc, Canada, June. DBLP, 2008:861-874.

J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, Reclaiming Space from Duplicate Files in a Serverless Distributed File System[C]. Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on. IEEE, 2002: 617-624.

S. Ghemawat, H. Gobioff, and S. Leung, The Google File System[M]. SOSP ’03 Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003, 37(5): 29-43.

D. Borthakur, HDFS architecture guide[J]. Hadoop Apache Project, 2008, 53.

J. Li, X. Chen, M. Li, J. Li, P.P.C. Lee, and W. Lou, Secure Deduplication with Efï¬cient and Reliable Convergent Key Management[J]. IEEE transactions on parallel and distributed systems, 2014, 25(6): 16151625.

G.R. Blakley and C.A. Meadows, Security of Ramp Schemes[C]. Crypto. 1984, 84: 242-268.

A.D. Santis and B. Masucci, Multiple Ramp Schemes[J]. IEEE Transactions on Information Theory, 1999, 45(5): 1720-1728.

M. Wen, K. Ota, H. Li, J. Lei, C. Gu, and Z. Su, Secure Data Deduplication with Reliable Key Management for Dynamic Updates in Cpss[J]. IEEE transactions on computational social systems, 2015, 2(4): 137-147.

W. Leesakul, P. Townend, and J. Xu, Dynamic Data Deduplication in Cloud Storage[C]. IEEE, International Symposium on Service Oriented System Engineering. IEEE, 2014:320-325.

F. Rashid, A. Miri, and I. Woungang, A secure data deduplication framework for cloud environments[C]. Tenth International Conference on Privacy, Security and Trust. IEEE Computer Society, 2012:81-87.

M. Bellare, S. Keelveedhi, and T. Ristenpart, Message-Locked Encryption and Secure Deduplication[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2013: 296-312.

M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, Message-Locked Encryption for Lock-Dependent Messages[M]. Advances in CryptologyCCRYPTO 2013. Springer, Berlin, Heidelberg, 2013: 374-391.

M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, Secure Data Deduplication[C]. Proceedings of the 4th ACM international workshop on Storage security and survivability. ACM, 2008: 1-10.

P. Anderson and L. Zhang, Fast and Secure Laptop Backups with Encrypted De-duplication[C]. LISA. 2010.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â