Data deduplication is a technique for eradicate reproduction copy of data and has been extensively used in cloud storage to reduce storage liberty and upload bandwidth. Hopeful as it is a happen challenge is to perform protected deduplication in cloud storage space. Even though convergent encryption for comprehensively implement for secure deduplication a dangerous problem of making convergent encryption realistic is to professionally and dependably handle a huge number of convergent keys. This paper makes the first effort to formally address the problem of accomplish efficient and dependable key management in secure reduplicate. We first establish a baseline come within reach of user clutch an independent master key for encrypting the convergent keys and outsourcing them to the cloud. However such a baseline key organization scheme generates a huge number of keys with the growing number of users and necessitates users to dedicatedly shelter the keys. We proposition dekey a new production in which users do not need to administer any keys on their own but as an alternative securely allocate the convergent key contribute to across several servers. Security investigations demonstrate that Dekey is secure in terms of the description specified in the projected precautions. A verification of concept we implement Dekey using the secret sharing scheme and display that Dekey deserves limited overhead in realistic location.
[1]
Yonggang Wen,et al.
Private data deduplication protocols in cloud storage
,
2012,
SAC '12.
[2]
Kristin E. Lauter,et al.
Cryptographic Cloud Storage
,
2010,
Financial Cryptography Workshops.
[3]
Benny Pinkas,et al.
Proofs of ownership in remote storage systems
,
2011,
CCS '11.
[4]
Dutch T. Meyer,et al.
A study of practical deduplication
,
2011,
TOS.
[5]
Benny Pinkas,et al.
Side Channels in Cloud Services: Deduplication in Cloud Storage
,
2010,
IEEE Security & Privacy.
[6]
Roberto Di Pietro,et al.
Boosting efficiency and security in proof of ownership for deduplication
,
2012,
ASIACCS '12.
[7]
Yang Tang,et al.
A Secure Cloud Backup System with Assured Deletion and Version Control
,
2011,
2011 40th International Conference on Parallel Processing Workshops.
[8]
Edgar R. Weippl,et al.
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
,
2011,
USENIX Security Symposium.