Filters








218 Hits in 3.5 sec

A Study on Deduplication Techniques over Encrypted Data

K. Akhila, Amal Ganesh, C. Sunitha
2016 Procedia Computer Science  
Currently, to ensure security, data stored in cloud as well as other large storage areas are in an encrypted format and one problem with that is, we cannot apply deduplication technique over such an encrypted  ...  As the amount of data being generated increases exponentially with time, duplicate data contents being stored cannot be tolerated.  ...  Message-Locked Encryption for Secure Large File Deduplication Block Level Message locked encryption Dual level: File level and Block level HEDup: Secure Deduplication with Homomorphic Encryption  ... 
doi:10.1016/j.procs.2016.05.123 fatcat:wtd6qbzqbzfp3pxalmijtrxlau

Encryption Approaches for Secure Deduplication in Cloud Environment

Ketaki Ohale, Aparna Junnarkar
2016 International Journal of Computer Applications  
These methods for secure deduplication improve the storage utilization and save network bandwidth.  ...  Different approaches for deduplication of this cloud multimedia like audio, images, videos are compared and studied.  ...  [2] Shows use of Block-Level Message-Locked Encryption (BL-MLE) for Secure Large File Deduplication.  ... 
doi:10.5120/ijca2016912498 fatcat:7vt5x3zgwjc5vnbwead2yqymhm

Veriable Message-Locked Encryption

Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine
2016 Zenodo  
One needs to use a \message-locked encryption" (MLE), which allows the detection of duplicates and the storage of only one encrypted le on the server, which can be decrypted by any owner of the file.  ...  To achieve this deduplication consistency, we provide (i) a generic transformation that applies to any MLE scheme and (ii) an ElGamal-based deduplication-consistent MLE, which is secure in the random oracle  ...  A Concrete Message Locked Encryption with Deduplication Consistency In this section, we describe our construction of a deduplication consistent MLE.  ... 
doi:10.5281/zenodo.246798 fatcat:f26veuygubgf7pgevbhsjc2vqy

Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms

Taek-Young Youn, Nam-Su Jho, Keonwoo Kim, Ku-Young Chang, Ki-Woong Park
2020 Energies  
In this paper, we present an analysis of the security features of deduplication techniques against identification attacks and show that the lack of security of the techniques can be eliminated by providing  ...  We also present a concrete countermeasure, called the time-locked deduplication technique, which can provide uncertainness to the conditional responses by withholding the operation of the deduplication  ...  To support the deduplication of ciphertexts, message-locked encryption was proposed [3] .  ... 
doi:10.3390/en13112742 fatcat:6nwyfpznhnd4di4konjyyezzxa

Survey on Deduplication in Cloud Environment

Dr. P. Kumar, E. V. Pavithra
2018 International Journal of Engineering Research and  
Based on the survey of previous papers the deduplication schemes need to focus on block level deduplication to save space and improve security.  ...  Several ideas are found and first it is done with file level.  ...  Cloud environment Java Dimitrios Vasilopoulous in the year 2016 POR Guarantee for storage correctness To reconcile proof of retrievability with file based cross user deduplication.  ... 
doi:10.17577/ijertv7is020012 fatcat:3j7mfznpmrgyhbkprtaybdgpl4

Verifiable Message-Locked Encryption [chapter]

Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine
2016 Lecture Notes in Computer Science  
One needs to use a "message-locked encryption" (MLE), which allows the detection of duplicates and the storage of only one encrypted file on the server, which can be decrypted by any owner of the file.  ...  To achieve this deduplication consistency, we provide (i) a generic transformation that applies to any MLE scheme and (ii) an ElGamal-based deduplicationconsistent MLE, which is secure in the random oracle  ...  A Concrete Message Locked Encryption with Deduplication Consistency In this section, we describe our construction of a deduplication consistent MLE.  ... 
doi:10.1007/978-3-319-48965-0_18 fatcat:u6aa53ugn5agnml7stgm2xj3dm

Data Storage and Retrieval with Deduplication in Secured Cloud Storage

2019 International Journal of Engineering and Advanced Technology  
One of the ultimate aim of this research is to achieve ideal deduplication on secured data of client side.  ...  On the other hand as the client's data are encrypted with different keys, the cross user deduplication is merely impossible as having a single key encryption among multiple user's leads to an in secure  ...  These remote servers can be used to retrieve data with the internet access.  ... 
doi:10.35940/ijeat.e7371.109119 fatcat:hj7vjzrkorezfb57m4h5djh6hy

An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized auditing deduplication Model in Cloud Storage System

K. Mamatha, D. Nandini, K. Raja Manohar Reddy
2017 International Journal of Advanced engineering Management and Science  
Keywords-cloud storage, data deduplication, secure auditing, proof of ownership protocol, Proof of retrievability, proof of ownership. I.  ...  In this work, we study the problem of integrity auditing and secure deduplication on cloud data.  ...  Bellare et al. [22] formalized this primitive as message-locked encryption, and explored its application in space-efficient secure outsourced storage.  ... 
doi:10.24001/ijaems.3.4.12 fatcat:pgah67lv6rfdnmcha2xshvqor4

Updatable Block-Level Message-Locked Encryption

Yongjun Zhao, Sherman S.M. Chow
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
Yet, it is unclear how to support deduplication of encrypted data securely until the study of Bellare et al. on message-locked encryption (Eurocrypt 2013).  ...  Deduplication is a widely used technique for reducing storage space of cloud service providers.  ...  Recently, we witness growing interest in cloud cryptography, such as searchable encryption, message-locked encryption, and proof of retrievability.  ... 
doi:10.1145/3052973.3053012 dblp:conf/ccs/ZhaoC17 fatcat:r5mdmfjblngixbivtwoga52zqq

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited [chapter]

Jia Xu, Jianying Zhou
2014 Lecture Notes in Computer Science  
(CCS '11) discovered security vulnerability in existing implementation of client-side deduplication and proposed a cryptographic primitive called "proofs of ownership" (PoW) as a countermeasure.  ...  Randomness Extractor and Proofs of Retrievability) and technique (i.e. sample-then-extract).  ...  Conclusion and Open Problems We were the first one to bridge construction of PoW with randomness extractor and proofs of retrievability.  ... 
doi:10.1007/978-3-319-07536-5_7 fatcat:3iyuamkzafb47lrlowopphcfoe

Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage

Neha Narayan Kulkarni, Shital Kumar A. Jain, . .
2018 International Journal of Engineering & Technology  
Therefore, different models are proposed for a data integrity check and proof of retrievability.  ...  This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.  ...  Message locked proof of retrievability It addresses the problem of data retrievability and the cross-user deduplication.  ... 
doi:10.14419/ijet.v7i3.6.14938 fatcat:vabwtqgk7nffhl2llwyaw7nmbm

Protective Auditing and Deduplicating Data in Cloud

Munde Sadashiv, B. M.
2016 International Journal of Computer Applications  
Major objective of this work is to acquire the data integrity and deduplication in order to keep our system secure as well as healthy.  ...  In previous work there is reduced the computation time of uploading and downloading time of data with the help of map reduce technique.  ...  As part of future work, SecCloud+ should be extended with more security features such as proofs of retrievability, data integrity checking and search over encrypted data.  ... 
doi:10.5120/ijca2016911276 fatcat:edccaf5itnc6zmx7liryd7reny

Secure and Efficient Data Retrieval of Data from Cloud with Effective Deduplication Scheme

Mr. Salithkumar. P
2021 International Journal for Research in Applied Science and Engineering Technology  
In addition to utilize cloud storage effectively deduplication of file should be identified accurately.  ...  This could be achieved through ABE algorithm and results shows that our system achieves better result in both parameter like storage utilization and secure data retrieval in cloud.  ...  (2016) proposed another cryptographic crude, Message-Locked Encryption (MLE), where the key under which encryption and decoding are performed is itself gotten from the message.  ... 
doi:10.22214/ijraset.2021.33609 fatcat:rpkklrn7tzdqtirapjneskpxee

A SURVEY ON SECURE DEDUPLICATION SCHEMES

AnitaA Kundgir, KalyaniP Daberao, SS Hatkar
2017 International Journal of Advanced Research  
practically they provide ROM security Analysis .they make connections with deterministic encryption hash function secure on correlated input for different message sources  ...  Message Locked Encryption:- MLE is a symmetric encryption scheme in which the encryption and decryption keys are same and are derived from the message shared.  ... 
doi:10.21474/ijar01/4604 fatcat:nro3jr5qivhhrmy5gazpgyt4xu

Detection of File Level and Block Level Deduplication and attacks in Cloud Computing Environment

Ms. Samita Mokal
2017 International Journal Of Engineering And Computer Science  
Secure deduplication is a technique for eliminating duplicate copies of storage data, and provides security to them.  ...  In cloud computing, security and storage space management techniques are most important factors for improving the performance of cloud computing.  ...  Symmetric Encryption, Convergent Encryption, Proofs of Ownership (PoWs), Ramp Secret Sharing, Secure Deduplication. In 1997.M.  ... 
doi:10.18535/ijecs/v6i1.55 fatcat:qh4cvhbrs5hxrd6tnof5zer4fa
« Previous Showing results 1 — 15 out of 218 results