Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:4 Issue:3 Year: 04 May,2016 Pages:1016-1024
Data deduplication is a method for removing duplicate copies of data, It has been largely used in cloud storage to reduce storage memory and upload bandwidth. It gives a challenge to do secure deduplication in cloud storage. In encryption methods the keys can be produced but cannot manage huge number of keys. In the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. The general approach in which each user holds an independent master key for encrypting the convergent keys and employing them to the cloud. such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to allegiance to protect the master keys. The De-key is the process ,which creates new construction in which users do not need to manage any keys on their own but instead of it secure distribute of the convergent key shares across multiple servers. Security analysis demonstrates that De-key is secure in the proposed security model. Proof is that in realistic environment the De-key used in ramp secret sharing .which can Demonstrate
De-duplication, convergent encryption, key management, auditing.
1. A.Shamir, ‘‘How to Share a Secret,’’. ACM, vol. 22,no. 11, pp. 612-613, 1979. 2. M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, ‘‘Secure Data De-duplication,’’ in Proc. Storages, 2008, pp. 1-10. 3. Y. Tang, P.P. Lee, J.C. Lui, and R. Perlman, ‘‘Secure Overlay Cloud Storage with Access Control and Assured Deletion,’’IEEE Trans. Dependable Secure Computer., vol. 9, no. 6, pp. 903-916,Nov./Dec. 2012.