survey on key management with deduplication technique

P BALASUBHRAMANYAM REDDY ,nagappan

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 20 December,2016         Pages:1198-1202

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Data deduplication is a method for removing duplicate copies of data, It has been largely used in cloud storage to reduce storage memory and upload bandwidth. It gives a challenge to do secure deduplication in cloud storage. In encryption methods the keys can be produced but cannot manage huge number of keys. In the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. The general approach in which each user holds an independent master key for encrypting the convergent keys and employing them to the cloud. such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to allegiance to protect the master keys. The De-key is the process ,which creates new construction in which users do not need to manage any keys on their own but instead of it secure distribute of the convergent key shares across multiple servers. Security analysis demonstrates that De-key is secure in the proposed security model. Proof is that in realistic environment the De-key used in ramp secret sharing .which can Demonstrate

Kewords

De-duplication, convergent encryption, key management, auditing.

Reference

1. A.Shamir, ‘‘How to Share a Secret,’’. ACM, vol. 22,no. 11, pp. 612-613, 1979. 2. M.W. Storer, K. Greenan, D.D.E. Long, and E.L. Miller, ‘‘Secure Data De-duplication,’’ in Proc. Storages, 2008, pp. 1-10. 3. Y. Tang, P.P. Lee, J.C. Lui, and R. Perlman, ‘‘Secure Overlay Cloud Storage with Access Control and Assured Deletion,’’IEEE Trans. Dependable Secure Computer., vol. 9, no. 6, pp. 903-916,Nov./Dec. 2012.