Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Authorized Deduplication with Data Mining in Cloud

N. Muthuselvi, A. Saranya, P. Shobanadevi, K. Saranya

Abstract


Cloud computing offers a new mode of service provision by reorganizing various resources over the internet. In traditional encryption while providing data confidentiality is incompatible with data deduplication. The different users to encrypt their data with their own keys. Thus, identical data copies of different users will lead to different cipher text making deduplication impossible. Convergent encryption method has been proposed to enforce data confidentiality while making deduplication feasible. It encrypt/decrypt a data copy with a convergent key which is attained by computing the cryptographic hash value of the content of the data copy. After key generation and data encryption users retain the keys and send the cipher text to the storage. Since the encryption operation is deterministic and is derived from the data content the identical data copies will generate the same convergent key and hence the same cipher text. Data mining is the process of extracting the information from the data bases. Data deduplication is one of important data mining techniques for eliminating duplicate copies of repeating data by it compares the data in cloud storage to reduce the amount of storage space and save bandwidth. To better protect data security this project makes the first attempt to formally address the problem of authorized data deduplication

Full Text:

PDF

References


M. Bellare, S. Keelveedhi, T. Ristenpart. “DupLESS: Server aided encryption for deduplicated storage,” In: Proc. 22nd USENIX Conf. Secur. 2013, 179–94p.

J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system, In: Proc. IEEE Int. Conf. Distrib. Comput. Syst. 2002, 617–24p. doi:10.1109/ICDCS.2002.1022312.

G. Wallace, et al. Characteristics of backup workloads in production systems, In: Proc USENIX Conf File Storage Technol. 2012, 1–16p.

Z.O. Wilcox. “Convergent encryption reconsidered,” 2011. [Online]. Available: http://www.mailarchive.com/cryptography @ metzdowd.com/msg08949.html.

G. Ateniese, K. Fu, M. Green, S. Hohenberger. Improved proxy re- encryption schemes with applications to secure distributed storage, ACM Trans Inform Syst Secur. 2006; 9(1): 1–30p. doi:10.1145/1127345.1127346.

Opendedup. (2016). [Online]. Available: http://opendedup.org/.

D.T. Meyer, W.J. Bolosky. A study of practical deduplication, ACM Trans Storage. 2012; 7(4): 1–20p. doi:10.1145/2078861.2078864.

M. Bellare, S. Keelveedhi, T. Ristenpart. Message-locked encryption and secure deduplication, In: Proc Cryptol – Eurocrypt. 2013; [8] 296–312p. doi:10.1007/978-3-642-38348-9_18.

D. Perttula, B. Warner, Z. Wilcox- O’Hearn. “Attacks on convergent encryption.” (2016). [Online]. Available: http://bit.ly/ yQxyvl.

C.Y. Liu, X.J. Liu, L. Wan. “Policy-based deduplication in secure cloud storage, In: Proc Trustworthy Comput Serv. 2013; 250–62p. doi:10.1007/978-3-642-35795-4_32.

P. Puzio, R. Molva, M. Onen, S. Loureiro. “ClouDedup: secure deduplication with encrypted data for cloud storage, Proc IEEE Int Conf Cloud Comput Technol Sci. 2013; 363–70p. doi:10.1109/CloudCom.2013.54.

Z. Sun, J. Shen, J.M. Yong. “DeDu: building a deduplication storage system over cloud computing, Proc IEEE Int Conf Comput Support Cooperat Work Des. 2011 ; 348–55p, doi:10.1109/CSCWD.2011.5960097.

Z.C. Wen, J.M. Luo, H.J. Chen, J.X. Meng, X. Li, J. Li. A verifiable data deduplication scheme in cloud computing, Proc Int Conf Intel Netw Collaborative Syst. 2014; 85–90p. doi:10.1109/INCoS.2014.111.

J. Li, Y.K. Li, X.F. Chen, P.P.C. Lee, W.J. Lou. A hybrid cloud approach for secure authorized deduplication, IEEE Trans Parallel Distrib Syst. 2015; 26(5): 1206–16p. doi:10.1109/TPDS.2014.2318320.

P. Meye, P. Raipin, F. Tronel, E. Anceaume. A secure two phase data deduplication scheme, Proc HPCC/CSS/ICESS. 2014; 802–9p. doi:10.1109/HPCC.2014.134.

J. Paulo, J. Pereira. A survey and classification of storage deduplication systems, ACM Comput Surveys. 2014; 47(1): 1–30p. doi:10.1109/HPCC.2014.134.

Y.-K. Li, M. Xu, C.-H. Ng, P.P.C. Lee. Efficient hybrid inline and out-of-line deduplication for backup storage, ACM Trans Storage. 2014; 11(1): 2:1–21p. doi:10.1145/2641572.

M. Fu, et al. Accelerating restore and garbage collection in deduplication- based backup systems via exploiting historical information, Proc USENIX Annu Tech Conf. 2014; 181–92p.

M. Kaczmarczyk, M. Barczynski, W. Kilian, C. Dubnicki. Reducing impact of data fragmentation caused by in-line deduplication, In: Proc. 5th Annu. Int. Syst. Storage Conf. 2012; 15:1–12p. doi:10.1145/2367589.2367600.

M. Lillibridge, K. Eshghi, D. Bhagwat. Improving restore speed for backup systems that use inline chunk-based deduplication, In: Proc. USENIX Conf. File Storage Technol. 2013, 183–98p.

L.J. Gao. Game theoretic analysis on acceptance of a cloud data access control scheme based on reputation, M.S. Thesis. Xidian University, State Key Lab of ISN, School of Telecommunications Engineering, Xi’an, China, 2015.




DOI: https://doi.org/10.37628/ijocspl.v3i1.260

Refbacks

  • There are currently no refbacks.