A Secured Deduplication of Encrypted Data Over an Attribute-Based Cloud Storage

International Journal of Computer Science and Engineering
© 2020 by SSRG - IJCSE Journal
Volume 7 Issue 7
Year of Publication : 2020
Authors : Olu Olu Osaronwolu, Matthias Daniel, V. I. E Anireh

pdf
How to Cite?

Olu Olu Osaronwolu, Matthias Daniel, V. I. E Anireh, "A Secured Deduplication of Encrypted Data Over an Attribute-Based Cloud Storage," SSRG International Journal of Computer Science and Engineering , vol. 7,  no. 7, pp. 77-83, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P113

Abstract:

Cloud Storage offer users an easy way of storing and sharing data, but due to privacy concerns of users, data encryption was introduced. Among
available forms of data encryption, Attribute based encryption (ABE) has been largely adopted because it provides a pliable secured approach for users to save and distribute data in cloud by enforcing an accesscontrol policy over data, hence only users who satisfy the access-control policy will be able to decrypt and access the encrypted data. However, traditional ABE cloud storages do not support secured data deduplication (a process of eliminating copies of identical data) which is vital in data management to ensure judicious utilization of storage space and network band-width. This work proposes a scheme to integrate secured data deduplication on an Attributebased Encryption Cloud Storage by resorting to a dual cloud setting, where one (private) cloud executes data deduplication, while the other (public) cloud provides storage service. Python programming language, jQuery, JavaScript, CSS, HTML. Heroku server was used to test the system during development. Experimental results show that secure deduplication of encrypted data can be achieve on an Attributebased cloud storage through a dual cloud approach where the private cloud is trusted.

Keywords:

Deduplication, ABE, Cloud computing

References:

[1] Rabi Prasad Padhy, M. R. (July-Dec 2014). “Cloud Computing: Security Issues and Research Challenges”. IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol. 1, No.2..
[2] Sahai, A., & Waters, B. (2005). “Fuzzy identity-based encryption. Advances in Cryptology - EUROCRYPT 2005”, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, Proceedings--Amos Fiat, M. N. (1993). Broadcast Encryption. CRYPTO '93 (pp. 480-491). California: Springer-Verlag Berlin, Heidelberg.
[3] B. Zhu, K. L. (2008). “Avoiding the disk bottleneck”. 6th USENIX Conference on File and Storage Technologies (pp. pp. 269-282). San Jose: USENIX
[4] Yao, D., & Nelly Fazio, Y. D. (2011). “Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption”. ACM Conference on Computer and Communications Security-CCS 2004.
[5] Craig Gentry, A. S. (2002). “Hierarchical ID-Based Cryptography.” ASIACRYPT '02 (pp. 548-566). Springer-Verlag Berlin, Heidelberg.
[6] Ran Canetti, S. H. (2003). “A forward-secure public-key encryption scheme”. EUROCRYPT'03 (pp. 255-271). Warsaw, Poland: Springer-Verlag Berlin, Heldelberg.
[7] Goyal, V., & O. Pandey, A. S. (2006). “Attribute-based encryption for fine grained access control of encrypted data”. ACM Conference on computer and communication security (pp. 89-98). Alexandria: Springer.
[8] *Jenkins, A., & Fellers, J. (1986). “An Annotated Bibliography on prototyping.” Institute for research on the management of informations, working paper., (p. W613). Indiana.
[9] Waters, Y. R. (2013). “Practical constructions and new proof methods for large universe attribute-based encryption”. ACM SIGSAC Conference on Computer and Communications Security, CCS'13 (pp. 463-474). Germany: ACM.
[10] Lewko, A. B., & B. Waters. (2011). “Unbounded HIBE and attribute-based. Advances in Cryptology - EUROCRYPT 2011” 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn (pp. 547-567). Springer.
[11] M. W. Storer, K. M. (2008). “Secure data deduplication. ACM Workshop On Storage Security And Survivability,” StorageSS (pp. 1-10). Alexandria: ACM.
[12] Diffie, W., & Hellman, M. (1976). “New directions in cryptography”. IEEE Transactions on information Theory, 644-654.
[13] Srivastava, A. (Dec 2014). “A Detailed Literature Review on Cloud Computing.” Asian Journal of Technology & Management Research [ISSN: 2249 -0892], Vol. 04 - Issue:02.
[14] Miguel Castro, B. L. (1999). “Practical Byzantine Fault Tolerance”. Third Symposium on Operating Systems Design and Implementation. New Orleans.
[15] Bellare, M., & Keelveedhi, S. (2015). “Interactive messagelocked encryption and secure deduplication”. Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography (pp. 516-538). Gaithersburg, MD, USA: Springer.