Secret Sharing of Convergent Keys to Third Party Concept of Dekey
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplication in cloud storage provider. The convergent encryption has been extensively adopted for secure de-duplication, but a critical issue is that managing a huge number of convergent keys. This paper makes the attempt to formally address the problem of achieving a reliable and efficient key management in secure deduplication of data. We first introduce a normal approach in which each user holds a master key independently for encrypting the convergent keys and outsourcing them to the cloud provider. However, such a baseline key management scheme generates an enormous number of master keys with the increasing number of users in the cloud and requires users to dedicatedly protect the keys . To this end, we propose Dekey, a new technique in which users do not need to manage any keys on their own but instead distribute the keys to multiple servers. Analysis of security demonstrates that Dekey is secured in terms of the definitions specified in the proposed security model. As a proof of ownership concept, we implement Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments.
Authors and Affiliations
Mrs. D. S. ArulMozhiArasi , Vaishali R , Saranya M
Low Power Design of A SRAM Cell for Embedded Memory
This paper presents a new SRAM cell to reduce power consumption with the feedback technique by using Schmitt Trigger in the proposed circuitry design. By the proposed design we may reduce the power consumption and ar...
Performance Evaluation of different Routing Algorithm in Wireless Ad hoc Networks
A mobile ad hoc network consists of wireless hosts and the movement of hosts results in a change in routes. There are many routing protocols proposed by different researchers but to determine which one work efficient...
Implementation of Node to Node Communication System on ARM 7 using CAN Bus
This project aims in designing a system which helps in monitoring and controlling multisingle chip communication system using CAN (Controller Area Network) protocol using LPC 2129 ARM. This system helps to achieve co...
Review on Novel Approach to Filter Unwanted Messages in On-line Social Networks
Nowadays, online social networking websites are used frequently. These websites are known as social sites. Social networking sites works like an online internet users community. Depending on the websites many of these...
Locating Equivalent Servants over P2P Networks
While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation...