0% found this document useful (0 votes)
67 views18 pages

Secure Data Deduplication With Dynamic Ownership Management in Cloud Storage

The document proposes a secure data deduplication scheme with dynamic ownership management in cloud storage. It aims to enhance data privacy and confidentiality against unauthorized users and an honest-but-curious cloud server. The proposed scheme features a reencryption technique that enables dynamic updates to ownership upon any changes. It also ensures security in settings with proofs of ownership by introducing a reencryption mechanism using an additional group key for dynamic ownership groups. Computation time analysis shows the proposed scheme is more efficient than previous schemes at achieving secure and fine-grained ownership management in cloud storage for data deduplication.

Uploaded by

ashish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views18 pages

Secure Data Deduplication With Dynamic Ownership Management in Cloud Storage

The document proposes a secure data deduplication scheme with dynamic ownership management in cloud storage. It aims to enhance data privacy and confidentiality against unauthorized users and an honest-but-curious cloud server. The proposed scheme features a reencryption technique that enables dynamic updates to ownership upon any changes. It also ensures security in settings with proofs of ownership by introducing a reencryption mechanism using an additional group key for dynamic ownership groups. Computation time analysis shows the proposed scheme is more efficient than previous schemes at achieving secure and fine-grained ownership management in cloud storage for data deduplication.

Uploaded by

ashish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Secure Data Deduplication with

Dynamic
Ownership Management in
Cloud Storage

Prepared By Guided By
Bharud Sagar B. Prof.D.P.Bhamare
Contents
Introduction
Scope & Objective
Literature Review
System Architecture
Implementation Details
Result Analysis
Conclusion
References
Introduction
Proposed System
In proposed system, data privacy is the primary security
requirement to protect against not only outside adversaries but
also inside the cloud server. However, not much work has yet
been done to address dynamic ownership management
encryption technique has been proposed to encrypt the data
before outsourcing .To better protect data security, this system
makes the first attempt to formally address the problem of
authorized data deduplication.
Scope
 Proposed system provides security to data.
 In proposed system,the poison attack on tag consistency can
easily detected .
 Proposed system provides data privacy against unauthorised
user who cannot prove ownership.
 In proposed system it provides a collusion resistance against
the invalid ownership of the unauthorised users.
Objective
 To provide the security to data from unauthorised users.
 To improve the efficiency.
 To provide the privacy to data from invalid ownership
user.
Literature Review
Name:“Understanding data deduplication ratios,” SNIA Data Management Forum, 2008.

Auther Name: M. Dutch

It will explore the significance of deduplication ratios related to specific

capacity optimization techniques within the context of information


lifecycle management.
The total or raw storage capacity of a disk drive is based on the number of

sectors available for data storage


Low space reduction ratios provide significant space savings.
Name: “Secure data deduplication,” Proc. StorageSS’08, 2008.
Auther: M. W. Storer, K. Greenan, D. D. E. Long, and E. L.
Miller
•This approach only requires that clients agree on the way they
divide files into chunks. Moreover, taking this approach does not
increase the likelihood of collision, which remains very small for
chunk identifiers of 160 bits or longer.
•The way to increase storage efficiency would be to provide
deletion and garbage collection.
•Implementation in many system are difficult because single chunk
may be referenced by many different file.
Name:“Private data deduplication protocols in cloud storage,”
Proc. ACM SAC’12, 2012.
Auther:N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti

•data privacy is the primary security requirement to protect against


not only outside adversaries but also inside the cloud server.
•To better protect data security, this system makes the first attempt to
formally address the problem of authorized data deduplication.
•The proposed scheme features a reencryption technique that enables
dynamic updates upon any ownership changes in the cloud storage.
Implementation Details
System Architecture

Figure: System Architecture


The architecture of the system, which consists of the following entities.
Data owner: This is a client who owns data, and wishes to upload it into
the cloud storage to save costs.
Cloud service provider: This is an entity that provides cloud storage
services. It consists of a cloud server and cloud storage. The cloud server
deduplicates the outsourced data from users if necessary and stores the
deduplicated data in the cloud storage
Threat Model and Security Requirements
•Data privacy
•Data integrity
•Backward and forward secrecy
•Collusion resistance
Algorithm
Security:

figure:Scheme overview and corresponding security


Result Analysis
Computation Time:
The proposed system analyzes and measure the computation cost

incurred when a data owner encrypts and decrypts data during upload
and download phases, respectively. The computation cost is in terms of
the computation of a cryptographic hash function for key generation,
tag generation (the hash function is also used for key
encryption/decryption in LR), data encryption/decryption, and key
decryption. The comparatively negligible bitwise exclusive-or
operations are ignored in the computation analysis results.
Figure.4.1 Computation time for upload
Comparison
The comparison results of the secure data deduplication
schemes,
that is convergent encryption (CE), leakage-resilient (LR)
Deduplication,and randomized convergent encryption (RCE) in
terms of the data
deduplication over encrypted data, tag consistency, and dynamic
ownership management.
Table 4.1: Comparison of secure deduplication schemes
Scheme Encrypted Duplication Tag Consistancy Ownership Managment

CE Yes No No

RL Yes Yes No

RCE Yes Yes No

Proposed Yes Yes Yes

System
Advantages:
•Dynamic ownership management guarantees the backward and forward secrecy of
deduplicated data upon any ownership change.
•The proposed scheme ensures security in the setting of PoW by introducing a
re-encryption mechanism that uses an additional group key for dynamic
ownership group.
•The proposed scheme enhances data privacy and confidentiality in cloud storage
against any users who do not have valid ownership of the data, as well as against an
honest-but-curious cloud server.
Disadvantages:
•This method required more time as it involved real time invocation of services.
Application:
•Increasing the security to data from
•Effective use of network bandwidth.
•Cost effective.
•Adept replication.
•Clear storage space.
Conclusion

 In proposed system novel secure data deduplication scheme to enhance a fine-

grained ownership management by exploiting the characteristic of the cloud data

management system.

 The proposed scheme features a reencryption technique that enables dynamic

updates upon any ownership changes in the cloud storage.

 The proposed scheme enhances data privacy and confidentiality in cloud storage

against any users who do not have valid ownership of the data, as well as against an

honest-but-curious cloud server.

 The proposed scheme is more efficient than the previous schemes. Therefore, the

proposed scheme achieves more secure and fine-grained ownership management in

cloud storage for secure and efficient data deduplication


References

[1] Youngjoo Shin, and Kyungtae Kang, “Secure Data Deduplication with
Dynamic Ownership Management in Cloud Storage,” DOI
10.1109/TKDE.2016.2580139, IEEE Transactions on Knowledge and Data
Engineering,2016.
 
 [2] M. Dutch, “Understanding data deduplication ratios,” SNIA Data
Management Forum, 2008.
 
 [3] M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data
deduplication,” Proc. StorageSS’08, 2008.
 
 [4] N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-
end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop
on Cloud Computing Security, pp. 21–32, 2014.
 
 [5] N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-
end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop
on Cloud Computing Security, pp. 21–32,2014.
Thank you

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy