Secure Data Deduplication with
Dynamic
Ownership Management in
Cloud Storage
Prepared By Guided By
Bharud Sagar B. Prof.D.P.Bhamare
Contents
Introduction
Scope & Objective
Literature Review
System Architecture
Implementation Details
Result Analysis
Conclusion
References
Introduction
Proposed System
In proposed system, data privacy is the primary security
requirement to protect against not only outside adversaries but
also inside the cloud server. However, not much work has yet
been done to address dynamic ownership management
encryption technique has been proposed to encrypt the data
before outsourcing .To better protect data security, this system
makes the first attempt to formally address the problem of
authorized data deduplication.
Scope
Proposed system provides security to data.
In proposed system,the poison attack on tag consistency can
easily detected .
Proposed system provides data privacy against unauthorised
user who cannot prove ownership.
In proposed system it provides a collusion resistance against
the invalid ownership of the unauthorised users.
Objective
To provide the security to data from unauthorised users.
To improve the efficiency.
To provide the privacy to data from invalid ownership
user.
Literature Review
Name:“Understanding data deduplication ratios,” SNIA Data Management Forum, 2008.
Auther Name: M. Dutch
It will explore the significance of deduplication ratios related to specific
capacity optimization techniques within the context of information
lifecycle management.
The total or raw storage capacity of a disk drive is based on the number of
sectors available for data storage
Low space reduction ratios provide significant space savings.
Name: “Secure data deduplication,” Proc. StorageSS’08, 2008.
Auther: M. W. Storer, K. Greenan, D. D. E. Long, and E. L.
Miller
•This approach only requires that clients agree on the way they
divide files into chunks. Moreover, taking this approach does not
increase the likelihood of collision, which remains very small for
chunk identifiers of 160 bits or longer.
•The way to increase storage efficiency would be to provide
deletion and garbage collection.
•Implementation in many system are difficult because single chunk
may be referenced by many different file.
Name:“Private data deduplication protocols in cloud storage,”
Proc. ACM SAC’12, 2012.
Auther:N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti
•data privacy is the primary security requirement to protect against
not only outside adversaries but also inside the cloud server.
•To better protect data security, this system makes the first attempt to
formally address the problem of authorized data deduplication.
•The proposed scheme features a reencryption technique that enables
dynamic updates upon any ownership changes in the cloud storage.
Implementation Details
System Architecture
Figure: System Architecture
The architecture of the system, which consists of the following entities.
Data owner: This is a client who owns data, and wishes to upload it into
the cloud storage to save costs.
Cloud service provider: This is an entity that provides cloud storage
services. It consists of a cloud server and cloud storage. The cloud server
deduplicates the outsourced data from users if necessary and stores the
deduplicated data in the cloud storage
Threat Model and Security Requirements
•Data privacy
•Data integrity
•Backward and forward secrecy
•Collusion resistance
Algorithm
Security:
figure:Scheme overview and corresponding security
Result Analysis
Computation Time:
The proposed system analyzes and measure the computation cost
incurred when a data owner encrypts and decrypts data during upload
and download phases, respectively. The computation cost is in terms of
the computation of a cryptographic hash function for key generation,
tag generation (the hash function is also used for key
encryption/decryption in LR), data encryption/decryption, and key
decryption. The comparatively negligible bitwise exclusive-or
operations are ignored in the computation analysis results.
Figure.4.1 Computation time for upload
Comparison
The comparison results of the secure data deduplication
schemes,
that is convergent encryption (CE), leakage-resilient (LR)
Deduplication,and randomized convergent encryption (RCE) in
terms of the data
deduplication over encrypted data, tag consistency, and dynamic
ownership management.
Table 4.1: Comparison of secure deduplication schemes
Scheme Encrypted Duplication Tag Consistancy Ownership Managment
CE Yes No No
RL Yes Yes No
RCE Yes Yes No
Proposed Yes Yes Yes
System
Advantages:
•Dynamic ownership management guarantees the backward and forward secrecy of
deduplicated data upon any ownership change.
•The proposed scheme ensures security in the setting of PoW by introducing a
re-encryption mechanism that uses an additional group key for dynamic
ownership group.
•The proposed scheme enhances data privacy and confidentiality in cloud storage
against any users who do not have valid ownership of the data, as well as against an
honest-but-curious cloud server.
Disadvantages:
•This method required more time as it involved real time invocation of services.
Application:
•Increasing the security to data from
•Effective use of network bandwidth.
•Cost effective.
•Adept replication.
•Clear storage space.
Conclusion
In proposed system novel secure data deduplication scheme to enhance a fine-
grained ownership management by exploiting the characteristic of the cloud data
management system.
The proposed scheme features a reencryption technique that enables dynamic
updates upon any ownership changes in the cloud storage.
The proposed scheme enhances data privacy and confidentiality in cloud storage
against any users who do not have valid ownership of the data, as well as against an
honest-but-curious cloud server.
The proposed scheme is more efficient than the previous schemes. Therefore, the
proposed scheme achieves more secure and fine-grained ownership management in
cloud storage for secure and efficient data deduplication
References
[1] Youngjoo Shin, and Kyungtae Kang, “Secure Data Deduplication with
Dynamic Ownership Management in Cloud Storage,” DOI
10.1109/TKDE.2016.2580139, IEEE Transactions on Knowledge and Data
Engineering,2016.
[2] M. Dutch, “Understanding data deduplication ratios,” SNIA Data
Management Forum, 2008.
[3] M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, “Secure data
deduplication,” Proc. StorageSS’08, 2008.
[4] N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-
end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop
on Cloud Computing Security, pp. 21–32, 2014.
[5] N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti, “Reconciling end-to-
end confidentiality and data reduction in cloud storage,” Proc. ACM Workshop
on Cloud Computing Security, pp. 21–32,2014.
Thank you