Data Deduplication with Dynamic Management in Cloud Storage

Authors

  • Nethra M.V.O. Professor, Department of CSE, R. R. Institute of Technology, Bengaluru, Karnataka, India
  • Yashaswini R. UG Student, R. R. Institute of Technology, Visvesvaraya Technological University, Bangalore, India

Keywords:

Deduplication, Proof-of-ownership, Encryption

Abstract

In cloud storage services, deduplication technology is commonly used to reduce the space and bandwidth requirements of services by eliminating redundant data and storing only a single copy of them. Deduplication is most effective when multiple users outsource the same data to the cloud storage, but it raises issues relating to security and ownership. Proof-of-ownership schemes allow any owner of the same data to prove to the cloud storage server that he owns the data in a robust way. However, many users are likely to encrypt their data before outsourcing them to the cloud storage to preserve privacy, but this hampers deduplication because of the randomization property of encryption. Recently, several deduplication schemes have been proposed to solve this problem by allowing each owner to share the same encryption key for the same data. However, most of the schemes suffer from security flaws, since they do not consider the dynamic changes in the ownership of outsourced data that occur frequently in a practical cloud storage service. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution.

References

C. Wang, Z. Qin, J. Peng, and J. Wang, “A novel encryption scheme for data deduplication system,” Proc. International Conference on Communications, Circuits and Ssytems (ICC-CAS), pp. 265–269, 2010.

C. Wang, Z. Qin, J. Peng, and J. Wang, “A novel encryption scheme for data deduplication system,” Proc. International Conference on Communications, Circuits and Ssytems (ICC-CAS), pp. 265–269, 2010.

D. Harnik, B. Pinkas, and A. Shulman Peleg, “Side channels in cloud services, the case of deduplication in cloud storage, ”IEEE Security & Privacy, vol. 8, no. 6, pp. 40–47, 2010.

D. T. Meyer, and W. J. Bolosky, “A study of practical deduplication,” Proc. USENIX Conference on File and Storage Technologies 2011, 2011.

M. Dutch, “Understanding data deduplication ratios,” SNIA Data Management Forum, 2008.

M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data deduplication,” Proc. StorageSS‟08, 2008.

Malicious insider attacks to rise, http://news.bbc.co.uk/2/hi/7875904.stm

N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop on Cloud Computing Security, pp. 21–32,2014.

P. S. S. Council, “PCI SSC data security standards overview,”2013.

W. K. Ng, W. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” Proc. ACM SAC‟12, 2012.

Downloads

Published

10-06-2019

How to Cite

Nethra M.V.O., & Yashaswini R. (2019). Data Deduplication with Dynamic Management in Cloud Storage. International Journal of Management Studies (IJMS), 6(Spl Issue 8), 46–49. Retrieved from https://researchersworld.com/index.php/ijms/article/view/2189

Issue

Section

Articles