Privacy Aware Data Deduplication for Side Channel in Cloud Storage

Abstract:

Data deduplication technique has been widely adopted by commercial cloud storage providers, which is both important and necessary in dealing with the explosive growth of information. To further protect the protection of users’ sensitive data within the outsourced storage mode, many secure data de duplication schemes are designed and applied in various scenarios. Among these schemes, secure and efficient re-encryption for encrypted data de duplication attracted the eye of the many scholars, and lots of solutions are designed to support dynamic ownership management. During this paper, we target the re-encryption de duplication storage system and show that the recently designed lightweight rekeying-aware encrypted de duplication scheme is liable to an attack which we call it stub-reserved attack. Furthermore, we propose a secure data de duplication scheme with efficient re-encryption supported the convergent all-or-nothing transform and randomly sampled bits from the Bloom filter. Because of the intrinsic property of one-way hash function, our scheme can resist the stub-reserved attack and guarantee the info privacy of information owners’ sensitive data. Moreover, rather than re-encrypting the complete package, data owners are only required to re-encrypt a tiny low a part of it through the CAONT, thereby effectively reducing the computation overhead of the system. Finally, security analysis and experimental results show that our scheme is secure and efficient in re-encryption.

EXISTING SYSTEM

In existing, the unquestionable SSE plans supporting information dynamic update are altogether founded on deviated key cryptography confirmation, which includes tedious activities. The overhead of check may turn into a critical weight because of the sheer measure of cloud information.

PROPOSED SYSTEM

In the proposed framework, we explore achieving watchword search over interesting encoded cloud data with symmetric-key based affirmation and propose a reasonable plot in this paper. In order to help the capable check of dynamic data, we plan a novel Accumulative Authentication Label reliant on the symmetric-key cryptography to deliver an affirmation tag for each catchphrase.

 

Post a Comment

0 Comments