Image and Text Encrypted Data with Authorized Deduplication in Cloud

Abstract

With the advent of cloud computing, secured data deduplication has gained a lot of popularity. Many techniques have been pro-posed in the literature of this ongoing research area. Among these techniques, the Message Locked Encryption (MLE) scheme is often mentioned. Researchers have introduced MLE based protocols which provide secured deduplication of data, where the data is generally in text form. As a result, multimedia data such as images and video, which are larger in size compared to text files, have not been given much attention. Applying secured data deduplication to such data files could significantly reduce the cost and space required for their storage .In this paper we present a secure deduplication scheme for near identical (NI) images using the Dual Integrity Convergent Encryption (DICE) protocol, which is a variant of the MLE based scheme. In the proposed scheme, an image is decomposed into blocks and the DICE protocol is applied on each block separately rather than on the entire image. As a result, the blocks that are common between two or more NI images are stored only once at the cloud. We provide detailed analyses on the theoretical, experimental and security aspects of the proposed scheme.

Country : India

1 Shubham Borade2 Abdulrehman Khan3 Abdullah Khan4 Afridi Sayyed5 Prof. Ranjana M. Kedar

  1. Student, Computer Engineering, KJ College of Engineering and Management Research, Pune, Maharashtra, India
  2. Student, Computer Engineering, KJ College of Engineering and Management Research, Pune, Maharashtra, India
  3. Student, Computer Engineering, KJ College of Engineering and Management Research, Pune, Maharashtra, India
  4. Student, Computer Engineering, KJ College of Engineering and Management Research, Pune, Maharashtra, India
  5. Professor, Computer Engineering, KJ College of Engineering and Management Research, Pune, Maharashtra, India

IRJIET, Volume 7, Issue 5, May 2023 pp. 278-282

doi.org/10.47001/IRJIET/2023.705037

References

  1. S. Halevi. D. Hornik. B. Pinkos. and A. Shulman-Peleg. “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM SIGSAC Conference on Computer and Communications Security. ACM, 20 I I, pp. 491-500.
  2. Gonzalez-Manzano and A. Orfila., “An efficient confidentiality preselving proof of ownership for deduplication ,” Journal of Network and Computer Applications. vol. 50, pp. 49-59, 2015.
  3. J. Blasco, R. Di Pietro, A. Orfila, and A. Sorniotti. “A tunable proof of ownership scheme for deduplication using bloom filters,” in Comm1ications and Network Security (eNS). 2014 IEEE Conference on. IEEE.
  4. W, K. Ng. Y. Wen, and H. Zhu, ”Private data deduplication protocols in cloud storage,” in Proceedings of the 27th Annual ACM Symposium on Applied Computinr; ACM, 20 12, pp. 441-446.
  5. R. Oi Pietro and A. Sorniotti. “Boosting efficiency and security in proof of ownership for deduplication.” in Proceedings of the 7th ACM Symposium on Information. Computer and Communications Security. ACM, 20 12, pp. 81-82.
  6. M. Li. C. Qin, and P. P, C. Lee, “Cdstore; toward reliable, secure. and cost- efficient cloud storage via convergent dispersal,” in Usenix Technical Conference, 20 15, pp. 45-53.
  7. Xu, E.-C. Chang, and l. Zhou, “Weak leakage-resilient client-side deduplication of encrypted data in cloud storage,” in Proceedings of the Sd! ACM- SIGSAC symposiwn on Information, computer and communications security. ACM. 20 J3, pp. 195-206.
  8. “Private Data Deduplication Protocols in Cloud Storage” Wee Keong Ng SCE, Yonggang Wen SCE, Huafei Zhu.
  9. “DupLESS: Server-Aided Encryption for Deduplicated Storage” Mihir Bellare and Sriram Keelveedhi, University of California, San Diego; Thomas Ris- tenpart, University of Wisconsin—Madison.
  10. “RevDedup: A Reverse Deduplication Storage System Optimized for Reads to Latest Backups” Chun-Ho Ng and Patrick P. C. Lee The Chinese University of Hong Kong, Hong Kong Technical Report June 28, 2013.
  11. “A secure data deduplication scheme for cloud storage” Jan Stanek Alessan- dro Sorniotti, Elli Andreoulaki, Lukas Kencl.
  12. “Dynamic Data Deduplication in Cloud Storage” Waraporn Leesakul, Paul Townend, Jie Xu School of Computing University of Leeds, Leeds, LS2 9JT United Kingdom.
  13. “Side channels in cloud services, the case of deduplication in cloud stor- age” Danny Harnik IBM Haifa Research Lab Benny Pinkas Bar Ilan Univesity Alexandra Shulman-Peleg IBM Haifa Research Lab.
  14. “Memory Deduplication as a Threat to the Guest OS” Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho National Institute of Advanced Industrial Science and Technology.