Professional Documents
Culture Documents
Available at http://www.ijcsonline.com/
Abstract
Cloud computing is mostly used technology these days, it allows users to share and store the data, online utilization
of services and resources on various types of devices. One of the important challenge of cloud computing is the
management of the increasing volume of data stored at the cloud servers. To look at this problem data deduplication
technique is being applied. To save bandwidth and storage area in cloud Data Deduplication is an important technique
to reduce repeated data.
Although deduplication has lots of benefits but it also adds concerns to privacy and security of data as it can lead to
insiders and outsiders attacks. To have secure data deduplication in cloud environment makes it more difficult. To have
protection and condentiality of sensitive data along with supporting data deduplication, the technique called
convergent encryption has been proposed to encrypt the data before sending it to the storage servers. To protect
security of data better, this paper makes an attempt to address the authorized data deduplication. Other than traditional
data deduplication systems differential privileges of the users are also being taken into knowledge while duplicate check
besides the data itself. Here we also provides several traditional deduplication system and addressed their problem using
our hybrid cloud approach.
Keywords: Deduplication, Convergent encryption, Authorized duplicate detection, Condentiality, Hybrid cloud
I. INTRODUCTION
Cloud computing technology is the more highly popular
technology in these days. Every computer user
knowingly or unknowingly regularly uses cloud services
in its day to day life, it could be during using social
networking sites or mailing sites or many others.
Network giants such as Facebook, Google ,Gmail,
Amazon etc. are using these cloud resources to stored
there huge amount of data. As cloud computing
becoming popular these day, the amount of data is being
stored in the cloud and shared by users is also increased.
One important challenge of cloud space
is the
management of the ultimate-increasing volume of data
space.
To handle the data in the cloud, data deduplication[18]
technique is being applied. Data deduplication[5][9] is a
special data minimizing technique for eliminating
matching copies of repeated data in the cloud storage. So
this type of process is being used to increase the storage
usage and could be used for network data transfers to
decrease the number of bytes that are to be sent by the
network cables, inspite of having the many such copies
with the similar contents, data deduplication technique
eliminates matching data by keeping only one copy set
and then referring other similar data to that file.
Deduplication of Data occur at file level or block level.
In case of deduplication at files level[20], a
complete file is used for checking for if any other file
60 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Towards Security and Authorization Based Data Deduplication Using Hybrid Cloud
C. Identification Protocol
D. Token Generation
For having authorized deduplication, the tag of the le F
will be obtained by applying hash like SHA-1 to le F
and the privilege . And to generate token from this tag a
secret key kp will be attached with a privilege p and the
file tag is being associated and then applied hash like
HMAC-SHA-1 to create the file token. Let Fp =
TagGen(Fkp) denote the file token of file F which is
only permitted to be accessed by the user with privilege
p. As a result of this, suppose a le has been uploaded by
a user which is having a token F,p and which is
duplicate, then the duplicate check of the file sent from
another user be successful if he has the le F with the
privilege p.
B. Proof of Ownership
Proof of ownership (PoW) [3] makes users to verify their
ownership over the data file to the cloud server provider.
Actually, PoW is performed as an interactive algorithm
run by a
user i.e. prover and a storage server i.e.
verifier. The verier gets a short value (M) from a data
61 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Towards Security and Authorization Based Data Deduplication Using Hybrid Cloud
62 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Towards Security and Authorization Based Data Deduplication Using Hybrid Cloud
with
Secure
63 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Towards Security and Authorization Based Data Deduplication Using Hybrid Cloud
64 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Towards Security and Authorization Based Data Deduplication Using Hybrid Cloud
65 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Towards Security and Authorization Based Data Deduplication Using Hybrid Cloud
VI. CONCLUSION
VII. SCREENSHOTS
66 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016
Towards Security and Authorization Based Data Deduplication Using Hybrid Cloud
[4] D. Ferraiolo and R. Kuhn. Role-based access controls. In 15th
NIST-NCSC National Computer Security Conf., 1992.
[5] S. Quinlan and S. Dorward. Venti: a new approach to archival
storage. In Proc. USENIX FAST, Jan 2002.
[6] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman.
Role-based access control models. IEEE Computer, 29:3847, Feb
1996
[7] M. Bellare, C. Namprempre, and G. Neven. Security proofs for
identity-based identication and signature schemes. J. Cryptology,
22(1):161, 2009.
REFERENCES
[1] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked
encryption and secure deduplication. In EUROCRYPT, pages296
312, 2013.
[2] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.
Reclaiming space from duplicate les in a serverless distributed le
system. In ICDCS, pages 617624, 2002.
[3] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of
ownership in remote storage systems. In Y. Chen, G. Danezis, and V.
Shmatikov, editors, ACM Conference on Computer and
Communications Security, pages 491500. ACM, 2011.
Compression
67 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 01, January, 2016