Authors :
Aditya Tryambak Sambare; Prathamesh Hanmant Shingate; Amol Kishor Shelke; Mansi Ranjit Thakur; G Nazia Sulthana
Volume/Issue :
Volume 9 - 2024, Issue 4 - April
Google Scholar :
https://tinyurl.com/433fyywp
Scribd :
https://tinyurl.com/37j2ter8
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24APR1394
Abstract :
Cloud storage is a crucial component of cloud
computing, allowing users to expand their storage without
upgrading their equipment and overcome resource
constraints. Cloud users' data is always encrypted before
being outsourced to ensure their security and privacy.
However, encrypted data may result in a significant waste
of cloud resources. Storage complicates data sharing
among authorized users. We continue to face issues with
encrypted data storage and deduplication. Traditional
deduplication strategies are designed for certain
application settings where data owners or cloud servers
have full control over the process. They cannot meet data
owners' varying requests based on data sensitivity. This
study proposes a flexible data storage management
method that combines deduplication and access control
across various Clouds. Service Providers (CSP). We assess
its performance through security analyses, comparisons,
and implementations. The results demonstrate security,
effectiveness, and efficiency for actual applications.
Keywords :
Data Deduplication, Cloud Computing, Access Control, Storage Management.
References :
- R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proc. 2009 ACM Workshop Cloud Comput. Secur., pp. 85-90, 2009.
- S. Kamara, and K. Lauter, "Cryptographic cloud storage," Financ. Crypto. Data Secur., pp. 136-149, Springer, 2010.
- Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," in Proc. 2012 IEEE INFOCOM, pp. 2581-2585, 2012.
- M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: scalable secure file sharing on untrusted storage," in Proc. USENIX Conf. File Storage Technol., pp. 29–42, 2003.
- E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: securing remote untrusted storage," in Proc. Netw. Distrib. Syst. Secur. Symp., pp. 131-145, 2003.
- J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. of IEEE Symp. Secur. Privacy (SP'07), pp. 321-334, 2007.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data”, in Proc. of 13th ACM Comput. Commun. Secur., pp. 89–98, 2006.
- S. Muller, S. Katzenbeisser, and C. Eckert, “Distributed attribute-based encryption,” in Proc. of 11th Annual Int. Conf. Inf. Secur. Crypto., pp. 20–36, 2008.
- A. Sahai, and B. Waters, “Fuzzy identity-based encryption,” in Proc. of 24th Int. Conf. Theory App. Cryptographic Tech., pp. 457– 473, 2005.
- S. C. Yu, C. Wang, K. Ren, and W. J. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. of IEEE INFOCOM, pp. 534–542, 2010.
- G. J. Wang, Q. Liu, J. Wu, and M. Y. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,” Comput. Secur., vol. 30, no. 5, pp. 320–331, 2011.
Cloud storage is a crucial component of cloud
computing, allowing users to expand their storage without
upgrading their equipment and overcome resource
constraints. Cloud users' data is always encrypted before
being outsourced to ensure their security and privacy.
However, encrypted data may result in a significant waste
of cloud resources. Storage complicates data sharing
among authorized users. We continue to face issues with
encrypted data storage and deduplication. Traditional
deduplication strategies are designed for certain
application settings where data owners or cloud servers
have full control over the process. They cannot meet data
owners' varying requests based on data sensitivity. This
study proposes a flexible data storage management
method that combines deduplication and access control
across various Clouds. Service Providers (CSP). We assess
its performance through security analyses, comparisons,
and implementations. The results demonstrate security,
effectiveness, and efficiency for actual applications.
Keywords :
Data Deduplication, Cloud Computing, Access Control, Storage Management.