Data Deduplication And Data Sharing With Delegated Access Control
Ms. Triveni Bhalerao, Prof. N. P. Kulkarni "Data Deduplication And Data Sharing With Delegated Access Control". International Journal of Computer Trends and Technology (IJCTT) V46(2):56-61, April 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Nowadays Data sharing, maintenance, its security
are major challenges in global world. User in the data sharing
system upload their file with the encryption using private key.
This property is especially important to any large scale data
sharing system, as any user leak the key information then it
will become difficult for the data owner to maintain security
of the information. In this system provide a concrete and
efficient instantiate of scheme, prove its security and provide
an implementation to show its practicality. There are lots of
challenges for data owner to share their data on servers or
cloud. There are different solutions to solve these problems. These
techniques are very much critical to handle key shared by the
data owner. This system will introduce how to reduce burden of
data owner, authenticate those who have the access to the data
on cloud. SHA algorithm is used by the TTP to generate the key
and that key will get share to user as well as the owner. The TTP
module receives encrypted file F using AES Algorithm from the
data owner and computes hash value using MD-5 algorithm. It
stores key in its database which will be used during the dynamic
operations and to determine the cheating party in the system
(CSP or Owner). Trusted Third Party sends file to Cloud Service
Provider to store data on cloud.
References
[1] Boyang Wang, Baochun Li and Hui Li, “Panda: Public Auditing for
Shared Datawith Efficient User Revocation in the Cloud”, in IEEE
TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, pp. 92-
106, 2014.
[2] Cheng-Kang Chu, Sherman S.M. Chow, Wen-GueyTzeng, Jianying Zhou,
and Robert H. Deng, “Key-Aggregate Cryptosystem for ScalableData
Sharing in Cloud Storage", in IEEE TRANSACTIONS ON PARALLEL
AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, pp. 468-477, 2014.
[3] Seung-Hyun Seo,Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino,
“An Efficient Certificateless Encryption forSecure Data Sharing in Public
Clouds”, in IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, VOL. 26, NO. 9, pp. 2107-2119, 2014.
[4] Mohamed Nabeel and Elisa Bertino, “Privacy Preserving Delegated
AccessControl in Public Clouds”, in IEEE TRANSACTIONS ON KNOWLEDGE
AND DATA ENGINEERING", VOL. 26, NO. 9, pp.2268-2280,
2014.
[5] Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong,
Guomin Yang, Tran Viet Xuan Phuong, and Qi Xie, “A DFA-Based
Functional Proxy Re-EncryptionScheme for Secure Public Cloud Data
Sharing”, in IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 9, NO. 10, pp. 1667-1680, 2014.
[6] Jiawei Yuan and Shucheng Yu, “Public Integrity Auditing for Dynamic
Data Sharing With Multiuser Modification", in IEEE TRANSACTIONS
ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8,
pp. 1717-1726, 2014.
[7] Tao Jiang and Jiafeng Ma, “‘Public Integrity Auditing for Dynamic Data
Sharing With Multiuser Group Modification", in IEEE TRANSACTIONS
ON TECHNOLOGY, VOL. 6, NO.7, pp.456-492, 2014.
[8] Jiawei Yuan and Shucheng Yu, Member, IEEE proposed a system on
“Public Integrity Auditing for Dynamic Data Sharing With Multiuser
Modification", in IEEE TRANSACTIONS ON SERVICES COMPUTING,
VOL. 4, NO. 2, pp. 1168-1207, 2014.
[9] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy
preserving public auditing for secure cloud storage”, in IEEE TRANS.
COMPUT., vol. 62, no. 2, pp. 362–375, Feb. 2013.
[10] Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang,
Li Xu, and Jianying Zhou, “Cost-Effective Authentic and Anonymous
Data Sharing with Forward Security", in IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, pp.
1667-1680, 2014.
Keywords
AES, Data Security, Deduplication, Cloud, Encryption,
Key, Recovery.