Security and Privacy Enhancing in Multi-Cloud Architecture with Data De-duplication

N. R. ANITHA RANI, K.L.N.College of Engineering; P. PREM KUMAR ,K.L.N.College of Engineering

Data DE duplication, Data Confidentiality, Security, Data Integrity, Multi-Cloud

Cloud computing makes IT more efficient and cost effective in today’s world. Cloud computing act as a virtual server that the user can access via internet on a needed basis and this eliminates the need for the companies to host their own servers and purchase of expensive software. On the other hand there arise many new types of cyber theft. The main concerns in cloud computing are data integrity, security and enhancement of storage space in the cloud. This paper focuses on maintaining data integrity and security from a user’s perspective and also provides clear understanding of achievable security merits by using multiple distinct clouds simultaneously and enhancing storage space of public cloud by DE duplication from a cloud service provider’s perspective. Symmetric key encryption is used to prevent unauthorized user from accessing data. Convergent encryption is used to maintain data confidentiality.
    [1] Ahamed K.Elmagarmid, Panagiotis G. Ipeirotis, Vassilios S. Verykios. (2007), ‘Duplicate Record Detection: A Survey’, IEEE Transactions on Knowledge and Data Engineering, Vol. 19, No. 1, pp.1-16. [2] Anderson P and Zhang L. (2010), ‘Fast and secure laptop backups with encrypted de-duplication’, In Proc. of USENIX LISA. [3] Bellare M,Keelveedhi S, and Ristenpart T. (2013), ‘Dupless: Server Aided encryption for deduplicated storage’, In USENIX Security Symposium, pp. 179-194. [4] Bellare M,Keelveedhi S, and Ristenpart T. (2013), ‘Message-locked encryption and secure deduplication’, In EUROCRYPT, pp.296– 312. [5] Bellare M, Namprempre C, and Neven G. (2008),‘Security proofs for identity-based identification and signature schemes’, Journal of Cryptology, Vol. 22, No. 1, pp. 1–61. [6] Bugiel S, Nurnberger S, Sadeghi A, and Schneider T. (2011), ‘Twin clouds: An architecture for secure cloud computing’, In Workshop on Cryptography and Security in Clouds, pp. 32-44. [7] Chang Liu, Rajiv Ranjan, Chi Yang ,Xuyun Zhang.(2015),’MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud’,IEEE Transactions on Computers, Vol. 64 , No 9, pp 2609 – 2622. [8] Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng.(2014),’Key-Aggregatecryptosystem for Scalable Data Sharing in Cloud Storage’, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No 2, pp. 468 – 477. [9] Douceur J R , Adya A, Bolosky W J, Simon D, and Theimer M. (2002), ‘Reclaiming space from duplicate files in a serverless distributed file system’, In ICDCS, pp 617–624. [10] Ferraiolo D and Kuhn R. (1992), ‘Role-based access controls’, In 15th NIST-NCSC National Computer Security Conf.,. [11] Halevi S,Harnik D,Pinkas B,Ra Shulman-peleg. (2011), ‘Proof of ownership in remote storage systems’, ACM Conference on Computer and Communications Security, pp. 491-500. [12] Huang, Ming Xian, Shaojing Fu, Jian Liu. (2014), ‘Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor ‘, IET Communications, Vol. 8, No 12, pp. 2106 – 2113. [13] Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, and Ninja Marnau. (2013), ‘Security and Privacy – Enhancing Multicloud Architectures’, IEEE Transaction on Dependable and Secure Computing, Vol. 10, No. 4, pp. 212 – 224. [14] Jia Yu, Kui Ren, Cong Wang. (2016),’Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates’, IEEE Transactions on Information Forensics and Security, Vol. PP , No 99, pp. 1. [15] JingweiLi, Xie, D.,Cai, Z. (2015), ‘Secure Auditing and Deduplicating data in Cloud’, IEEE Transaction on Computers, Vol. PP, No. 99, pp. 1. [16] Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli. (2015), ’Secure Deduplication storage systems supporting keyword search’, Journal of Computer and System Sciences-ACM, Vol. 81, No. 8, pp.1532- 1541. [17] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C, Lee and Wenjing Lou.(2014). ‘Secure Deduplication with Efficient and Reliable Convergent Key Management’, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 6, pp.1615-1625. [18] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. (2015), ‘A Hybrid Cloud Approach for Secure Authorized Deduplication’, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 5, pp.1206 – 1216. [19] Li J., Chen X., Huang X., Tang S., Xiang Y., Hassan M, Alelaiwi. (2015), ‘Secure Distributed Deduplication Systems with Improved Reliability’, IEEE Transactions on Computers, Vol. PP, No. 99, pp.1. [20] Li Chaoling, Chen Yue, Zhou Yanzhou. (2014), ‘A Data assured deletion scheme in cloud storage’, IEEE Transactions on Communications, Vol.11, No.4, pp 98-110. [21] Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino. (2014),’ An Efficient Certificate less Encryption for Secure Data Sharing in Public Clouds ‘,IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 9, pp 2107 – 2119.
Paper ID: GRDCF002033
Published in: Conference : International Conference on Innovations in Engineering and Technology (ICIET - 2016)
Page(s): 145 - 149