Deduplication on Encrypted Data in Cloud Computing


Authors : Aditya Tryambak Sambare; Prathamesh Hanmant Shingate; Amol Kishor Shelke; Mansi Ranjit Thakur; G Nazia Sulthana

Volume/Issue : Volume 9 - 2024, Issue 4 - April

Google Scholar : https://tinyurl.com/433fyywp

Scribd : https://tinyurl.com/37j2ter8

DOI : https://doi.org/10.38124/ijisrt/IJISRT24APR1394

Abstract : Cloud storage is a crucial component of cloud computing, allowing users to expand their storage without upgrading their equipment and overcome resource constraints. Cloud users' data is always encrypted before being outsourced to ensure their security and privacy. However, encrypted data may result in a significant waste of cloud resources. Storage complicates data sharing among authorized users. We continue to face issues with encrypted data storage and deduplication. Traditional deduplication strategies are designed for certain application settings where data owners or cloud servers have full control over the process. They cannot meet data owners' varying requests based on data sensitivity. This study proposes a flexible data storage management method that combines deduplication and access control across various Clouds. Service Providers (CSP). We assess its performance through security analyses, comparisons, and implementations. The results demonstrate security, effectiveness, and efficiency for actual applications.

Keywords : Data Deduplication, Cloud Computing, Access Control, Storage Management.

References :

  1. R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proc. 2009 ACM Workshop Cloud Comput. Secur., pp. 85-90, 2009.
  2. S. Kamara, and K. Lauter, "Cryptographic cloud storage," Financ. Crypto. Data Secur., pp. 136-149, Springer, 2010.
  3. Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," in Proc. 2012 IEEE INFOCOM, pp. 2581-2585, 2012.
  4. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: scalable secure file sharing on untrusted storage," in Proc. USENIX Conf. File Storage Technol., pp. 29–42, 2003.
  5. E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: securing remote untrusted storage," in Proc. Netw. Distrib. Syst. Secur. Symp., pp. 131-145, 2003.
  6. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. of IEEE Symp. Secur. Privacy (SP'07), pp. 321-334, 2007.
  7. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data”, in Proc. of 13th ACM Comput. Commun. Secur., pp. 89–98, 2006.
  8. S. Muller, S. Katzenbeisser, and C. Eckert, “Distributed attribute-based encryption,” in Proc. of 11th Annual Int. Conf. Inf. Secur. Crypto., pp. 20–36, 2008.
  9. A. Sahai, and B. Waters, “Fuzzy identity-based encryption,” in Proc. of 24th Int. Conf. Theory App. Cryptographic Tech., pp. 457– 473, 2005.
  10. S. C. Yu, C. Wang, K. Ren, and W. J. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. of IEEE INFOCOM, pp. 534–542, 2010.
  11. G. J. Wang, Q. Liu, J. Wu, and M. Y. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,” Comput. Secur., vol. 30, no. 5, pp. 320–331, 2011.

Cloud storage is a crucial component of cloud computing, allowing users to expand their storage without upgrading their equipment and overcome resource constraints. Cloud users' data is always encrypted before being outsourced to ensure their security and privacy. However, encrypted data may result in a significant waste of cloud resources. Storage complicates data sharing among authorized users. We continue to face issues with encrypted data storage and deduplication. Traditional deduplication strategies are designed for certain application settings where data owners or cloud servers have full control over the process. They cannot meet data owners' varying requests based on data sensitivity. This study proposes a flexible data storage management method that combines deduplication and access control across various Clouds. Service Providers (CSP). We assess its performance through security analyses, comparisons, and implementations. The results demonstrate security, effectiveness, and efficiency for actual applications.

Keywords : Data Deduplication, Cloud Computing, Access Control, Storage Management.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe