Secure Data Deduplication With Dynamic Ownership Management in Cloud Storage
Secure Data Deduplication With Dynamic Ownership Management in Cloud Storage
Dynamic
Ownership Management in
Cloud Storage
Prepared By Guided By
Bharud Sagar B. Prof.D.P.Bhamare
Contents
Introduction
Scope & Objective
Literature Review
System Architecture
Implementation Details
Result Analysis
Conclusion
References
Introduction
Proposed System
In proposed system, data privacy is the primary security
requirement to protect against not only outside adversaries but
also inside the cloud server. However, not much work has yet
been done to address dynamic ownership management
encryption technique has been proposed to encrypt the data
before outsourcing .To better protect data security, this system
makes the first attempt to formally address the problem of
authorized data deduplication.
Scope
Proposed system provides security to data.
In proposed system,the poison attack on tag consistency can
easily detected .
Proposed system provides data privacy against unauthorised
user who cannot prove ownership.
In proposed system it provides a collusion resistance against
the invalid ownership of the unauthorised users.
Objective
To provide the security to data from unauthorised users.
To improve the efficiency.
To provide the privacy to data from invalid ownership
user.
Literature Review
Name:“Understanding data deduplication ratios,” SNIA Data Management Forum, 2008.
incurred when a data owner encrypts and decrypts data during upload
and download phases, respectively. The computation cost is in terms of
the computation of a cryptographic hash function for key generation,
tag generation (the hash function is also used for key
encryption/decryption in LR), data encryption/decryption, and key
decryption. The comparatively negligible bitwise exclusive-or
operations are ignored in the computation analysis results.
Figure.4.1 Computation time for upload
Comparison
The comparison results of the secure data deduplication
schemes,
that is convergent encryption (CE), leakage-resilient (LR)
Deduplication,and randomized convergent encryption (RCE) in
terms of the data
deduplication over encrypted data, tag consistency, and dynamic
ownership management.
Table 4.1: Comparison of secure deduplication schemes
Scheme Encrypted Duplication Tag Consistancy Ownership Managment
CE Yes No No
RL Yes Yes No
System
Advantages:
•Dynamic ownership management guarantees the backward and forward secrecy of
deduplicated data upon any ownership change.
•The proposed scheme ensures security in the setting of PoW by introducing a
re-encryption mechanism that uses an additional group key for dynamic
ownership group.
•The proposed scheme enhances data privacy and confidentiality in cloud storage
against any users who do not have valid ownership of the data, as well as against an
honest-but-curious cloud server.
Disadvantages:
•This method required more time as it involved real time invocation of services.
Application:
•Increasing the security to data from
•Effective use of network bandwidth.
•Cost effective.
•Adept replication.
•Clear storage space.
Conclusion
management system.
The proposed scheme enhances data privacy and confidentiality in cloud storage
against any users who do not have valid ownership of the data, as well as against an
The proposed scheme is more efficient than the previous schemes. Therefore, the
[1] Youngjoo Shin, and Kyungtae Kang, “Secure Data Deduplication with
Dynamic Ownership Management in Cloud Storage,” DOI
10.1109/TKDE.2016.2580139, IEEE Transactions on Knowledge and Data
Engineering,2016.
[2] M. Dutch, “Understanding data deduplication ratios,” SNIA Data
Management Forum, 2008.
[3] M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data
deduplication,” Proc. StorageSS’08, 2008.
[4] N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-
end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop
on Cloud Computing Security, pp. 21–32, 2014.
[5] N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-
end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop
on Cloud Computing Security, pp. 21–32,2014.
Thank you