Privacy in Cross-User Data Deduplication

Author(s):  
Hoda Jannati ◽  
Ebrahim Ardeshir-Larijani ◽  
Behnam Bahrak
Keyword(s):  
Author(s):  
Milind B. Waghmare ◽  
Suhasini V. Padwekar

Cloud computing technology is rapidly developing nowadays. The number of files stored and processed is increasing per day. This increase brings severe challenge in requirement of space, processing power and bandwidth. More than half of the data generated in the cloud is duplicate data. To handle this data, deduplication technique is used which eliminates duplicate copies of data. This removal of duplicate data increases storage efficiency and reduce cost. In this paper, we propose secure role re-encryption system which allows authorized deduplication of data and also maintains privacy of data. This system is based on convergent algorithm and re-encryption algorithm that encrypts the user data and assign role keys to each user. This system grants privileges to users in order to maintain ownership of each user so that authorized users can access the data efficiently. In this system management center is introduced where the file is being encrypted and role keys are generated to handle authorized requests. Role keys are stored in Merkle hash tree which maps relationship between roles and keys. Authorized user who has particular role-encryption key can access the file. Convergent algorithm and role re-encryption algorithm allows access of specific file without leakage of private data. Dynamic updating of user privileges is achieved.


2020 ◽  
Vol 8 (6) ◽  
pp. 1806-1811

Cloud storage is a platform where we can store and access the data through internet. Many Social and business applications are backing up their data in cloud. So, the requirement of cloud storage increases day by day. But most of the files present in the cloud storage are redundant. Removing redundant files in cloud is one way to manage the storage space requirement. For that purpose, we apply File-level data deduplication technique. In this paper, a method for deduplication is proposed which is named as policy and attribute based dedupe system. This system includes access control over files to enhance the security. It also reduces the storage space and increase the security of user data.


2013 ◽  
Vol 33 (9) ◽  
pp. 2493-2496
Author(s):  
Xueqiong LIU ◽  
Gang WU ◽  
Houping DENG

2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Sign in / Sign up

Export Citation Format

Share Document