DocumentCode :
3587440
Title :
Efficient cross user data deduplication in remote data storage
Author :
Prajapati, Priteshkumar ; Shah, Parth
Author_Institution :
Dept. of Inf. Technol., C.S.P.I.T., Changa, India
fYear :
2014
Firstpage :
1
Lastpage :
5
Abstract :
Cloud data storage service providers such as Mozy, Dropbox, and others perform deduplication to save space by only storing one copy of each file uploaded. While using cloud data storage clients always concern for confidentiality of data. So clients usually encrypt their data, and put it on to the storage. If client specific key is used for encryption then each client has different key so in this case deduplication is not possible. Single key within the network is used for encryption then all data is insecure even if one client is compromised and attacker gets the key. Message-locked encryption resolves this problem. But it is inherently subject to brute-force attacks that can recover files falling into a known set. In DupLESS get and put operations are most expensive operations in terms of time. In proposed architecture, we provide secure deduplicated storage resisting brute-force attacks, and realize it in a modification of existing system DupLESS using blowfish algorithm. Clients encrypt under message-based keys obtained via an oblivious PRF protocol from a key-server. Clients encrypt data and send it to the storage server provider then storage server performs deduplication. It is observed that compare to DupLESS, Proposed System achieve more performance in terms of time. Post process and target deduplication is used at storage server side.
Keywords :
cloud computing; cryptography; information storage; storage management; Dropbox; DupLESS; Mozy; PRF protocol; blowfish algorithm; brute-force attacks; cloud data storage service providers; data deduplication; data encryption; key-server; message-based keys; remote data storage; Cloud computing; Convergence; Encryption; Protocols; Servers; Blowfish; Cloud Storage; Dropbox; DupLESS; Message-locked encryption; convergence encryption; oblivious PRF protocol; secure deduplication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Convergence of Technology (I2CT), 2014 International Conference for
Print_ISBN :
978-1-4799-3758-5
Type :
conf
DOI :
10.1109/I2CT.2014.7092019
Filename :
7092019
Link To Document :
بازگشت