Secure Deduplication And Data Security With Authorized Duplicate Check

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2016 by IJPTT Journal
Volume - 6 Issue - 6
Year of Publication : 2016
Authors : R. Ravishankar , D. Ananthanayaki, K. K. Kavitha


R. Ravishankar , D. Ananthanayaki, K. K. Kavitha "Secure Deduplication And Data Security With Authorized Duplicate Check". International Journal of P2P Network Trends and Technology (IJPTT), V6(6):7-11 Nov - Dec 2016, ISSN:2249-2615,, Published by Seventh Sense Research Group.


Cloud computing useful for sharing information among the users with unlimited storage space. Data deduplication is method for eliminating duplicate copies of data, to reduce storage space and upload bandwidth in cloud.Toachieve secure deduplication in cloud, convergent encryption has been used.Convergent encryption generates identical ciphertext from identical plaintext files. In cloud computing the duplicate files has to be removed from storage without the provider have access to the encryptionkeys.The problem is there is no efficient and reliable key management.To achieve this Dekey , a new construction in which users no need to manage any keys on their own but they securely distribute the convergent key shares across multiple servers. Encryption mechanisms not preserve the data in the cloud from unauthorized access from both inside attacker as well as outside attacker.To minimize the attacks and also provide security in cloud computing, user behavior and decoy information technology called as Fog Computing has to be implemented.


[1] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
[2] J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, ‘‘Reclaiming Space from Duplicate Files in a Serverless Distributed File System,’’ in Proc. ICDCS, 2002, pp. 617-624.
[3] W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer, “Feasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs”, SIGMETRICS 2000, ACM, 2000, pp. 34-43.
[4] A. Adya, W. J. Bolosky, M. Castro, R. Chaiken, G. Cermak, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, Dec.2002. USENIX.
[5] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings of the 22nd [6] International Conference on Distributed Computing Systems.
[7] M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, ‘‘Secure Data Deduplication,’’ in Proc. StorageSS, 2008, pp. 1-10.
[8] A. Juels and B. S. Kaliski, Jr. Pors: proofs of retrievability for large files. In ACM CCS ’07, pages 584–597. ACM, 2007.
[9] H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT ’08, pages 90–107. Springer-Verlag, 2008.
[10] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS’09, pages 355–370. Springer-Verlag, 2009.
[11] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In ACM CCS ’07, pages 598–609. ACM, 2007.
[12] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In ACM CCS ’07, pages 598–609. ACM, 2007.
[13] P. Anderson and L. Zhang, ‘‘Fast and Secure Laptop Backupswith Encrypted De-Duplication,’’ in Proc. USENIX LISA, 2010,pp. 1-8.
[14] M. Bellare, S. Keelveedhi, and T. Ristenpart, ‘‘Message-Locked Encryption and Secure Deduplication,’’ in Proc. IACR Cryptology ePrint Archive, 2012, pp. 296-3122012:631.
[15] Bitcasa, ini_nite storage. (Cited on page 3.)
[16] Ciphertite data backup. (Cited on page 3.)
[17] A. Rahumed, H. Chen, Y. Tang, P. Lee, and J. Lui. A secure cloud backup system with assured deletion andversion control. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on, pages160-167 IEEE, 2011.
[18] Z. Wilcox-O'Hearn and B. Warner. Tahoe: The least-authority _lesystem. In Proceedings of the 4th ACM international workshop on Storage security and survivability, pages 21-26. ACM, 2008.
[19] S. P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. In D. Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 61-77. Springer, Aug. 2003.
[20] A. Yun, C. Shi, and Y. Kim, ‘‘On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage,’’ in Proc. ACM CCSW, Nov. 2009, pp. 67-76.
[21] M. Ben-Salem and S. J. Stolfo, “Modeling user search-behavior for masquerade detection,” in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection . Heidelberg: Springer, September 2011, pp. 1–20.
[22] J. Pepitone, “Dropbox’s password nightmare highlights cloud risks,” June 2011.
[23] Salvatore J. Stolfo, Malek Ben Salem and Angelos D. Keromytis “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud” IEEE Symposium On Security And Privacy Workshop (SPW) YEAR 2012.
[24] .Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou” A Hybrid Cloud Approach for Secure Authorized Deduplication” IEEE Transactions On Parallel And Distributed System VOL:PP NO:99 YEAR 2013.
[25] I.Sudha1, A.Kannaki2, S.Jeevidha3” Alleviating Internal Data Theft Attacks by Decoy Technology in Cloud”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.3, March- 2014, pg. 217-222. B. M. Bowen and S. Hershkop, “Decoy Document Distributor:,” 2009. [Online]. Available:
[26] Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing Lou “Secure Deduplication with Efficient and Reliable Convergent Key Management” IEEE Transactions On Parallel And Distributed Systems, VOL. 25, NO. 6, JUNE 2014.

Deduplication, Convergent encryption key management, Dekey, User behaviour profiling, DecoyTechnology.