IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET152294                                                     

Data De-Duplication Correction And Secure Key Authentication in Cloud


C. Pradeesh Kumar, G. Arunnath , K. Jegadesan , S. Harish
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. We first introduce a baseline approach in which each user holds an independent master key for encrypting the convergent keys and outsourcing them to the cloud. However, such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to dedicatedly protect the master keys. To this end, we propose Dekey, a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers. Security analysis demonstrates that Dekey is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments.

C. Pradeesh Kumar, G. Arunnath , K. Jegadesan , S. Harish

Deduplication, proof of ownership, convergent encryption, WWW, component, formatting, style, styling



[1] NIST’s Policy on Hash Functions, Sept. 2012. [Online]. Available: http://csrc.nist.gov/groups/ST/hash/policy.html.

[2] AmazonCase Studies. [Online]. Available: https://aws.amazon. com/solutions/case-studies/#backup.

[3] P. Anderson and L. Zhang, ‘‘Fast and Secure Laptop Backupswith Encrypted De-Duplication,’’ in Proc. USENIX LISA, 2010, pp. 1-8.

[4] M. Bellare, S. Keelveedhi, and T. Ristenpart, ‘‘Message-Locked Encryption and Secure Deduplication,’’ in Proc. IACR Cryptology ePrint Archive, 2012, pp. 296-3122012:631.

[5] G.R. Blakley and C. Meadows, ‘‘Security of Ramp Schemes,’’ in Proc. Adv. CRYPTO, vol. 196, Lecture Notes in Computer Science, G.R. Blakley and D. Chaum, Eds., 1985, pp. 242-268.


[6] A.T. Clements, I. Ahmad, M. Vilayannur, and J. Li, ‘‘Decentralized Deduplication in San Cluster File Systems,’’ in Proc. USENIX ATC, 2009, p. 8.

[7] J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, ‘‘Reclaiming Space from Duplicate Files in a Serverless Distributed File System,’’ in Proc. ICDCS, 2002, pp. 617-624.

[8] J. Gantz and D. Reinsel, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, Biggest Growth in the Far East, Dec. 2012. [Online]. Available: http://www.emc.com/collateral/analystreports/ idc-the-digital-universe-in-2020.pdf.

[9] R. Geambasu, T. Kohno, A. Levy, and H.M. Levy, ‘‘Vanish: Increasing Data Privacy with Self-Destructing Data,’’ in Proc. USENIX Security Symp., Aug. 2009, pp. 316-299.


Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
320-322 IJSRSET152294   Technoscience Academy

Cite This Article

C. Pradeesh Kumar, G. Arunnath , K. Jegadesan , S. Harish, "Data De-Duplication Correction And Secure Key Authentication in Cloud", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.320-322, March-April-2015.
URL : http://ijsrset.com/IJSRSET152294.php