SlideShare a Scribd company logo
A HybridCloudApproachforsecure AuthorizedDe-duplication
1 info@ocularsystems.in
Mobile No 7385350430
1. Introduction:
Data deduplication is one of important data compression techniques for eliminating duplicate
copies of repeating data, and has been widely used in cloud storage to reduce the amount of
storage space and save bandwidth. To protect the confidentiality of sensitive data while
supporting deduplication, the convergent encryption technique has been proposed to encrypt
the data before outsourcing. To better protect data security, this paper makes the first attempt
to formally address the problem of authorized data deduplication. Different from traditional
deduplication systems, the differential privileges of users are further considered in duplicate
check besides the data itself. We also present several new deduplication constructions
supporting authorized duplicate check in a hybrid cloud architecture. Security analysis
demonstrates that our scheme is secure in terms of the definitions specified in the proposed
security model. As a proof of concept, we implement a prototype of our proposed authorized
duplicate check scheme and conduct test-bed experiments using our prototype. We show that
our proposed authorized duplicate check scheme incurs minimal overhead compared to
normal operations.
2. Previous system Problem :
previous deduplication systems cannot support differential authorization duplicate check,
which is important in many applications. In such an authorized deduplication system, each
user is issued a set of privileges during system initialization.
1. Billing nature of cloud services:
a. Pay As You Go: User needs to pay charges as per disk space utilized by
him. So, because of duplicate copies of file user need to pay more amounts.
b. Duplicate file upload also increase bandwidth utilization, so it degrades
network performance.
c. User need to afford higher cost for large bandwidth uses.
2. Access to Authorized Users:
A HybridCloudApproachforsecure AuthorizedDe-duplication
2 info@ocularsystems.in
Mobile No 7385350430
a. In cloud computing environment, same file could be shared to many
users. So, there is need of implementation of access control system.
b. Authorized users should get download access to shared files in his access
domain.
3. Confidentiality:
a. Cloud service providers are the third party service providers. So, Its not
secure to store confidential contents as it is on cloud.
b. To maintain confidentiality we need to implement encryption/
decryption scheme.
c. But if stored encrypted files on cloud then, we can’t that, the new file
going to be uploaded on cloud is already present or not. So, In this paper
convergence key is generated based on signature/ hash function on original
data. So that we can achieve confidentiality as well as de-duplication.
4. Indexing & Retrieval:
a. As we are avoiding duplicate data storage, document retrieval will be
more efficient as index takes smaller space than files itself.
3. Literature Survey:
[1]P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication.
In Proc. of USENIX LISA, 2010
Summary :
Many people now store large quantities of personal and corporate data on laptops or home
computers. These often have poor or intermittent connectivity, and are vulnerable to theft or
hardware failure. Conventional backup solutions are not well suited to this environment, and
backup regimes are frequently inadequate. This paper describes an algorithm which takes
advantage of the data which is common between users to increase the speed of backups, and
reduce the storage requirements. This algorithm supports client-end per-user encryption
A HybridCloudApproachforsecure AuthorizedDe-duplication
3 info@ocularsystems.in
Mobile No 7385350430
which is necessary for confidential personal data. It also supports a unique feature which
allows immediate detection of common subtrees, avoiding the need to query the backup
system for every file. We describe a prototype implementation of this algorithm for Apple OS
X, and present an analysis of the potential effectiveness, using real data obtained from a set of
typical users. Finally, we discuss the use of this prototype in conjunction with remote cloud
storage, and present an analysis of the typical cost savings.
[2] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for
deduplicated storage. In USENIX Security Symposium, 2013.
Summary :
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication to
save space by only storing one copy of each file uploaded. Should clients conventionally
encrypt their files, however, savings are lost. Message-locked encryption (the most prominent
manifestation of which is convergent encryption) resolves this tension. However it is
inherently subject to brute-force attacks that can recover files falling into a known set. We
propose an architecture that provides secure deduplicated storage resisting brute-force
attacks, and realize it in a system called DupLESS. In DupLESS, clients encrypt under
message-based keys obtained from a key-server via an oblivious PRF protocol. It enables
clients to store encrypted data with an existing service, have the service perform de-
duplication on their behalf, and yet achieves strong confidentiality guarantees. We show that
encryption for de-duplicated storage can achieve performance and space savings close to that
of using the storage service with plaintext data.
[3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure
de-duplication. In EUROCRYPT, pages 296– 312, 2013.
Summary :
We formalize a new cryptographic primitive, Message-Locked Encryption (MLE), where the
key under which encryption and decryption are performed is itself derived from the message.
MLE provides a way to achieve secure de-duplication (space-efficient secure outsourced
storage), a goal currently targeted by numerous cloud-storage providers. We provide
definitions both for privacy and for a form of integrity that we call tag consistency. Based on
this foundation, we make both practical and theoretical contributions. On the practical side,
we provide ROM security analyses of a natural family of MLE schemes that includes
deployed schemes. On the theoretical side the challenge is standard model solutions, and we
A HybridCloudApproachforsecure AuthorizedDe-duplication
4 info@ocularsystems.in
Mobile No 7385350430
make connections with deterministic encryption, hash functions secure on correlated inputs
and the sample-then-extract paradigm to deliver schemes under different assumptions and for
different classes of message sources. Our work shows that MLE is a primitive of both
practical and theoretical interest.
[4] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based
identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.
Summary :
This paper provides either security proofs or attacks for a large number of identity-based
identification and signature schemes defined either explicitly or implicitly in existing
literature. Underlying these are a framework that on the one hand helps explain how these
schemes are derived, and on the other hand enables modular security analyses, thereby
helping to understand, simplify and unify previous work.
[5] M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security
against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177,
2002.
[6] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin
clouds: An architecture for secure cloud computing. In Workshop on Cryptography and
Security in Clouds (WCSC 2011), 2011.
Motivation :
1. Convergent encryption is open to a "confirmation of a file attack" in which an attacker
can effectively confirm whether a target possesses a certain file by encrypting an
unencrypted, or plain-text, version and then simply comparing the output with files
possessed by the target.
2. So to overcome these we can use another encryption technique instead of this like
AES/MAES etc.
3. We are proposing client side deduplication scheme as future scope.
4. Objective
 To design the front end where user is able to request to the private cloud to get
the token for the file.
A HybridCloudApproachforsecure AuthorizedDe-duplication
5 info@ocularsystems.in
Mobile No 7385350430
 After that user able to upload or download the file.
 To develop and design code for generating convergent key and proof of
ownership.
 To test the system with the proper tool.
5. Methodology:
In this paper, we address the problem of privacy preserving de-duplication in cloud
computing and propose a new de-duplication system supporting for
• Differential Authorization. Each authorized user is able to get his/her individual token of
his file to perform duplicate check based on his privileges. Under this assumption, any user
cannot generate a token for duplicate check out of his privileges or without the aid from the
private cloud server.
• Authorized Duplicate Check. Authorized user is able to use his/her individual private keys
to generate query for certain file and the privileges he/she owned with the help of private
cloud, while the public cloud performs duplicate check directly and tells the user if there is
any duplicate. The security requirements considered in this paper lie in two folds, including
the security of file token and security of data files. For the security of file token, two aspects
are defined as unforgeability and indistinguishability of file token. The details are given
below.
• Unforgeability of file token/duplicate-check token. Unauthorized users without appropriate
privileges or file should be prevented from getting or generating the file tokens for duplicate
check of any file stored at the S-CSP. The users are not allowed to collude with the public
cloud server to break the unforgeability of file tokens. In our system, the S-CSP is honest but
curious and will honestly perform the duplicate check upon receiving the duplicate request
from users. The duplicate check token of users should be issued from the private cloud server
in our scheme.
• Indistinguishability of file token/duplicate-check token. It requires that any user without
querying the private cloud server for some file token, he cannot get any useful information
from the token, which includes the file information or the privilege information.
A HybridCloudApproachforsecure AuthorizedDe-duplication
6 info@ocularsystems.in
Mobile No 7385350430
• Data Confidentiality. Unauthorized users without appropriate privileges or files, including
the S-CSP and the private cloud server, should be prevented from access to the underlying
plaintext stored at S-CSP. In another word, the goal of the adversary is to retrieve and recover
the files that do not belong to them. In our system, compared to the previous definition of
data confidentiality based on convergent encryption, a higher level confidentiality is defined
and achieved.
6. System Design and Architecture:
The diagram of the proposed approach is shown below.
7. Future work/ Own Contributions:
A HybridCloudApproachforsecure AuthorizedDe-duplication
7 info@ocularsystems.in
Mobile No 7385350430
The CSP provides a web interface for the client to store data into a set of cloud servers, which
are running in a cooperated and distributed manner. In addition, the web interface is used by
the users to retrieve, modify and restore data from the cloud, depending on their access rights.
Moreover, the CSP relies on database servers to map client identities to their stored data
identifiers and group identifiers.
Our secure client-side data deduplication scheme is based on an original use of the
convergent encryption.That is, on one hand, when a data owner wants to store a new
enciphered data file in remote storage servers, he has first to generate the enciphering key.
This data encrypting key is derived by applying a one way hash function on data content.
After successfully encrypting the file data, the client has to generate the data identifier of
enciphered data, in order to check its uniqueness in cloud database, before uploading the
claimed file. This data identifier is computed by using a Merkle hash tree, over encrypted
contents. Then, for subsequent data outsourcing, the client is not required to send the same
encrypted data. However, he has to substitute a client-server interactive proof scheme (PoW),
in order to prove his ownership
8. References:
[1] P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-
duplication. In Proc. of USENIX LISA, 2010
[2] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for
deduplicated storage. In USENIX Security Symposium, 2013.
A HybridCloudApproachforsecure AuthorizedDe-duplication
8 info@ocularsystems.in
Mobile No 7385350430
[3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure
de-duplication. In EUROCRYPT, pages 296– 312, 2013.
[4] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based
identification and signature schemes. J. Cryptology, 22(1):1–61, 2009.
[5] M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security
against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177,
2002.
[6] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin
clouds: An architecture for secure cloud computing. In Workshop on Cryptography and
Security in Clouds (WCSC 2011), 2011.

More Related Content

DOCX
Hybrid Cloud Approach for Secure Authorized Deduplication
Prem Rao
 
PDF
Doc A hybrid cloud approach for secure authorized deduplication
Shakas Technologie
 
PDF
A hybrid cloud approach for secure authorized deduplication
Pvrtechnologies Nellore
 
PPTX
A hybrid cloud approach for secure authorized deduplication.
prudhvikumar madithati
 
DOC
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
DOCX
A hybrid cloud approach for secure authorized deduplication
Adz91 Digital Ads Pvt Ltd
 
PPTX
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
DOCX
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Prem Rao
 
Doc A hybrid cloud approach for secure authorized deduplication
Shakas Technologie
 
A hybrid cloud approach for secure authorized deduplication
Pvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication.
prudhvikumar madithati
 
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
A hybrid cloud approach for secure authorized deduplication
Adz91 Digital Ads Pvt Ltd
 
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 

What's hot (17)

PDF
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
PDF
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
 
PDF
A hybrid cloud approach for secure authorized deduplication
Tmks Infotech
 
PDF
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
PDF
A hybrid cloud approach for secure authorized deduplication
LeMeniz Infotech
 
DOCX
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
PPTX
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
PDF
a hybrid cloud approach for secure authorized
logicsystemsprojects
 
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
DOCX
Secure auditing and deduplicating data in cloud
CloudTechnologies
 
PDF
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
 
PDF
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijripublishers Ijri
 
PPTX
Secure erasure code based cloud storage system with secure data forwarding
Priyank Rupera
 
DOCX
a hybrid cloud approach for secure authorized reduplications
swathi78
 
PPT
Ppt 1
shanmugamsara
 
PDF
262 265
Editor IJARCET
 
PDF
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
 
A hybrid cloud approach for secure authorized deduplication
Tmks Infotech
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
A hybrid cloud approach for secure authorized deduplication
LeMeniz Infotech
 
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
a hybrid cloud approach for secure authorized
logicsystemsprojects
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Secure auditing and deduplicating data in cloud
CloudTechnologies
 
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijripublishers Ijri
 
Secure erasure code based cloud storage system with secure data forwarding
Priyank Rupera
 
a hybrid cloud approach for secure authorized reduplications
swathi78
 
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
Ad

Viewers also liked (18)

PDF
Adopting hybrid cryptography technique for reduction of network overhead in m...
eSAT Journals
 
PPT
Project
blueash1198
 
PDF
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
KEY
Alice & bob public key cryptography 101
Joshua Thijssen
 
PDF
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
Nexgen Technology
 
PPTX
Deduplication
Lars Marius Garshol
 
PPTX
Hybrid encryption
ranjit banshpal
 
PPTX
Hybrid encryption ppt
prashantdahake
 
KEY
Alice & bob public key cryptography 101
Joshua Thijssen
 
PPT
Cryptography and Message Authentication NS3
koolkampus
 
PPTX
Cryptography.ppt
kusum sharma
 
PDF
Fog computing may help to save energy in cloud computing
ieeepondy
 
PDF
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
IJCERT
 
PPTX
[DPM 2015] PerfectDedup - Secure Data Deduplication for Cloud Storage
Pasquale Puzio
 
PPTX
Open Source Data Deduplication
RedWireServices
 
PPTX
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
shobhiya kumar
 
PDF
Hybrid Cryptography with examples in Ruby and Go
Eleanor McHugh
 
PDF
A hybrid cloud approach for secure authorized deduplication
Shakas Technologies
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
eSAT Journals
 
Project
blueash1198
 
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Alice & bob public key cryptography 101
Joshua Thijssen
 
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
Nexgen Technology
 
Deduplication
Lars Marius Garshol
 
Hybrid encryption
ranjit banshpal
 
Hybrid encryption ppt
prashantdahake
 
Alice & bob public key cryptography 101
Joshua Thijssen
 
Cryptography and Message Authentication NS3
koolkampus
 
Cryptography.ppt
kusum sharma
 
Fog computing may help to save energy in cloud computing
ieeepondy
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
IJCERT
 
[DPM 2015] PerfectDedup - Secure Data Deduplication for Cloud Storage
Pasquale Puzio
 
Open Source Data Deduplication
RedWireServices
 
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01
shobhiya kumar
 
Hybrid Cryptography with examples in Ruby and Go
Eleanor McHugh
 
A hybrid cloud approach for secure authorized deduplication
Shakas Technologies
 
Ad

Similar to A Hybrid Cloud Approach for Secure Authorized Deduplication (20)

PDF
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
hemanthbbc
 
PDF
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
DOCX
JAVA projects 2014
Senthilvel S
 
PDF
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...
INFOGAIN PUBLICATION
 
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
PDF
Secured Authorized Deduplication Based Hybrid Cloud
theijes
 
PDF
E031102034039
theijes
 
PDF
Attribute-Based Data Sharing
IJERA Editor
 
PDF
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
 
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
PDF
Ijaiem 2014-11-30-122
Sathya Madhesh
 
PDF
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
PDF
H1803035056
IOSR Journals
 
PDF
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
IEEEFINALSEMSTUDENTPROJECTS
 
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
IEEEFINALYEARSTUDENTPROJECT
 
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
PDF
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
hemanthbbc
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
JAVA projects 2014
Senthilvel S
 
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...
INFOGAIN PUBLICATION
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
Secured Authorized Deduplication Based Hybrid Cloud
theijes
 
E031102034039
theijes
 
Attribute-Based Data Sharing
IJERA Editor
 
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Ijaiem 2014-11-30-122
Sathya Madhesh
 
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
H1803035056
IOSR Journals
 
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
IEEEFINALYEARSTUDENTPROJECT
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 

More from SWAMI06 (11)

DOCX
Secure Distibuted data discovery & dissemination IN WSN
SWAMI06
 
PDF
ns2-project-list
SWAMI06
 
DOCX
Heart disease prediction system
SWAMI06
 
DOC
Detection of Spyware by Mining Executable Files
SWAMI06
 
PPTX
Annotating Search Results from Web Databases
SWAMI06
 
PPTX
Multimedia Answer Generation for Community Question Answering
SWAMI06
 
DOCX
Keyword Query Routing
SWAMI06
 
PPTX
Efficient Instant-Fuzzy Search With Proximity Ranking
SWAMI06
 
PDF
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
SWAMI06
 
PPTX
A Segmentation based Sequential Pattern Matching for Efficient Video Copy De...
SWAMI06
 
PPTX
Frequent itemset mining_on_hadoop
SWAMI06
 
Secure Distibuted data discovery & dissemination IN WSN
SWAMI06
 
ns2-project-list
SWAMI06
 
Heart disease prediction system
SWAMI06
 
Detection of Spyware by Mining Executable Files
SWAMI06
 
Annotating Search Results from Web Databases
SWAMI06
 
Multimedia Answer Generation for Community Question Answering
SWAMI06
 
Keyword Query Routing
SWAMI06
 
Efficient Instant-Fuzzy Search With Proximity Ranking
SWAMI06
 
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
SWAMI06
 
A Segmentation based Sequential Pattern Matching for Efficient Video Copy De...
SWAMI06
 
Frequent itemset mining_on_hadoop
SWAMI06
 

Recently uploaded (20)

PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Inventory management chapter in automation and robotics.
atisht0104
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
Information Retrieval and Extraction - Module 7
premSankar19
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 

A Hybrid Cloud Approach for Secure Authorized Deduplication

  • 1. A HybridCloudApproachforsecure AuthorizedDe-duplication 1 [email protected] Mobile No 7385350430 1. Introduction: Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct test-bed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations. 2. Previous system Problem : previous deduplication systems cannot support differential authorization duplicate check, which is important in many applications. In such an authorized deduplication system, each user is issued a set of privileges during system initialization. 1. Billing nature of cloud services: a. Pay As You Go: User needs to pay charges as per disk space utilized by him. So, because of duplicate copies of file user need to pay more amounts. b. Duplicate file upload also increase bandwidth utilization, so it degrades network performance. c. User need to afford higher cost for large bandwidth uses. 2. Access to Authorized Users:
  • 2. A HybridCloudApproachforsecure AuthorizedDe-duplication 2 [email protected] Mobile No 7385350430 a. In cloud computing environment, same file could be shared to many users. So, there is need of implementation of access control system. b. Authorized users should get download access to shared files in his access domain. 3. Confidentiality: a. Cloud service providers are the third party service providers. So, Its not secure to store confidential contents as it is on cloud. b. To maintain confidentiality we need to implement encryption/ decryption scheme. c. But if stored encrypted files on cloud then, we can’t that, the new file going to be uploaded on cloud is already present or not. So, In this paper convergence key is generated based on signature/ hash function on original data. So that we can achieve confidentiality as well as de-duplication. 4. Indexing & Retrieval: a. As we are avoiding duplicate data storage, document retrieval will be more efficient as index takes smaller space than files itself. 3. Literature Survey: [1]P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, 2010 Summary : Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure. Conventional backup solutions are not well suited to this environment, and backup regimes are frequently inadequate. This paper describes an algorithm which takes advantage of the data which is common between users to increase the speed of backups, and reduce the storage requirements. This algorithm supports client-end per-user encryption
  • 3. A HybridCloudApproachforsecure AuthorizedDe-duplication 3 [email protected] Mobile No 7385350430 which is necessary for confidential personal data. It also supports a unique feature which allows immediate detection of common subtrees, avoiding the need to query the backup system for every file. We describe a prototype implementation of this algorithm for Apple OS X, and present an analysis of the potential effectiveness, using real data obtained from a set of typical users. Finally, we discuss the use of this prototype in conjunction with remote cloud storage, and present an analysis of the typical cost savings. [2] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013. Summary : Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication to save space by only storing one copy of each file uploaded. Should clients conventionally encrypt their files, however, savings are lost. Message-locked encryption (the most prominent manifestation of which is convergent encryption) resolves this tension. However it is inherently subject to brute-force attacks that can recover files falling into a known set. We propose an architecture that provides secure deduplicated storage resisting brute-force attacks, and realize it in a system called DupLESS. In DupLESS, clients encrypt under message-based keys obtained from a key-server via an oblivious PRF protocol. It enables clients to store encrypted data with an existing service, have the service perform de- duplication on their behalf, and yet achieves strong confidentiality guarantees. We show that encryption for de-duplicated storage can achieve performance and space savings close to that of using the storage service with plaintext data. [3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure de-duplication. In EUROCRYPT, pages 296– 312, 2013. Summary : We formalize a new cryptographic primitive, Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way to achieve secure de-duplication (space-efficient secure outsourced storage), a goal currently targeted by numerous cloud-storage providers. We provide definitions both for privacy and for a form of integrity that we call tag consistency. Based on this foundation, we make both practical and theoretical contributions. On the practical side, we provide ROM security analyses of a natural family of MLE schemes that includes deployed schemes. On the theoretical side the challenge is standard model solutions, and we
  • 4. A HybridCloudApproachforsecure AuthorizedDe-duplication 4 [email protected] Mobile No 7385350430 make connections with deterministic encryption, hash functions secure on correlated inputs and the sample-then-extract paradigm to deliver schemes under different assumptions and for different classes of message sources. Our work shows that MLE is a primitive of both practical and theoretical interest. [4] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009. Summary : This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlying these are a framework that on the one hand helps explain how these schemes are derived, and on the other hand enables modular security analyses, thereby helping to understand, simplify and unify previous work. [5] M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002. [6] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011. Motivation : 1. Convergent encryption is open to a "confirmation of a file attack" in which an attacker can effectively confirm whether a target possesses a certain file by encrypting an unencrypted, or plain-text, version and then simply comparing the output with files possessed by the target. 2. So to overcome these we can use another encryption technique instead of this like AES/MAES etc. 3. We are proposing client side deduplication scheme as future scope. 4. Objective  To design the front end where user is able to request to the private cloud to get the token for the file.
  • 5. A HybridCloudApproachforsecure AuthorizedDe-duplication 5 [email protected] Mobile No 7385350430  After that user able to upload or download the file.  To develop and design code for generating convergent key and proof of ownership.  To test the system with the proper tool. 5. Methodology: In this paper, we address the problem of privacy preserving de-duplication in cloud computing and propose a new de-duplication system supporting for • Differential Authorization. Each authorized user is able to get his/her individual token of his file to perform duplicate check based on his privileges. Under this assumption, any user cannot generate a token for duplicate check out of his privileges or without the aid from the private cloud server. • Authorized Duplicate Check. Authorized user is able to use his/her individual private keys to generate query for certain file and the privileges he/she owned with the help of private cloud, while the public cloud performs duplicate check directly and tells the user if there is any duplicate. The security requirements considered in this paper lie in two folds, including the security of file token and security of data files. For the security of file token, two aspects are defined as unforgeability and indistinguishability of file token. The details are given below. • Unforgeability of file token/duplicate-check token. Unauthorized users without appropriate privileges or file should be prevented from getting or generating the file tokens for duplicate check of any file stored at the S-CSP. The users are not allowed to collude with the public cloud server to break the unforgeability of file tokens. In our system, the S-CSP is honest but curious and will honestly perform the duplicate check upon receiving the duplicate request from users. The duplicate check token of users should be issued from the private cloud server in our scheme. • Indistinguishability of file token/duplicate-check token. It requires that any user without querying the private cloud server for some file token, he cannot get any useful information from the token, which includes the file information or the privilege information.
  • 6. A HybridCloudApproachforsecure AuthorizedDe-duplication 6 [email protected] Mobile No 7385350430 • Data Confidentiality. Unauthorized users without appropriate privileges or files, including the S-CSP and the private cloud server, should be prevented from access to the underlying plaintext stored at S-CSP. In another word, the goal of the adversary is to retrieve and recover the files that do not belong to them. In our system, compared to the previous definition of data confidentiality based on convergent encryption, a higher level confidentiality is defined and achieved. 6. System Design and Architecture: The diagram of the proposed approach is shown below. 7. Future work/ Own Contributions:
  • 7. A HybridCloudApproachforsecure AuthorizedDe-duplication 7 [email protected] Mobile No 7385350430 The CSP provides a web interface for the client to store data into a set of cloud servers, which are running in a cooperated and distributed manner. In addition, the web interface is used by the users to retrieve, modify and restore data from the cloud, depending on their access rights. Moreover, the CSP relies on database servers to map client identities to their stored data identifiers and group identifiers. Our secure client-side data deduplication scheme is based on an original use of the convergent encryption.That is, on one hand, when a data owner wants to store a new enciphered data file in remote storage servers, he has first to generate the enciphering key. This data encrypting key is derived by applying a one way hash function on data content. After successfully encrypting the file data, the client has to generate the data identifier of enciphered data, in order to check its uniqueness in cloud database, before uploading the claimed file. This data identifier is computed by using a Merkle hash tree, over encrypted contents. Then, for subsequent data outsourcing, the client is not required to send the same encrypted data. However, he has to substitute a client-server interactive proof scheme (PoW), in order to prove his ownership 8. References: [1] P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de- duplication. In Proc. of USENIX LISA, 2010 [2] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
  • 8. A HybridCloudApproachforsecure AuthorizedDe-duplication 8 [email protected] Mobile No 7385350430 [3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure de-duplication. In EUROCRYPT, pages 296– 312, 2013. [4] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. J. Cryptology, 22(1):1–61, 2009. [5] M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002. [6] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.