Survey on secret sharing scheme with deduplication in cloud computing

Data deduplication is one of the techniques used for eliminating duplicate copies of data which is widely used in cloud to reduce storage space and increase bandwidth. Convergent encryption has been extensively adopted for secure deduplication, in order to use efficiently and reliably manage a huge number of convergent keys. A baseline approach named as Dekey is used to distribute the convergent key which would be shared across multiple servers. But implementation of Dekey using the Ramp secret sharing scheme has some limitations; a heavy computational cost is required to make n shares and recover the secret as a solution to this problem. Hence a new (k, L, n)-threshold ramp scheme (extension of existing ramp scheme) is proposed which is perfect, idle and faster secret sharing scheme, every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret.

[1]  Matthew K. Franklin,et al.  Communication complexity of secure computation (extended abstract) , 1992, STOC '92.

[2]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[3]  Min-Shiang Hwang,et al.  A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..

[4]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[5]  Toshiaki Tanaka,et al.  A New (k, n)-Threshold Secret Sharing Scheme and Its Extension , 2008, ISC.

[6]  Vinod M. Prabhakaran,et al.  On the Communication Complexity of Secure Computation , 2013, IACR Cryptol. ePrint Arch..

[7]  Y. Fujii,et al.  A fast (2,n)-threshold scheme and its application , 2005 .

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Ernest F. Brickell,et al.  Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.

[10]  Toshiaki Tanaka,et al.  A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[12]  Doug Finner Long-Term Storage of Electronic Data , 2004 .

[13]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.