Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Attribute-Based Storage Supporting Secure

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Attribute-Based Storage Supporting SecureDeduplication of

Encrypted Data in Cloud


ABSTRACT:

Attribute-based encryption (ABE) has been widely used in cloud computing where
a data provider outsources his/herencrypted data to a cloud service provider, and
can share the data with users possessing specific credentials (or attributes).
However,the standard ABE system does not support secure deduplication, which is
crucial for eliminating duplicate copies of identical data inorder to save storage
space and network bandwidth. In this paper, we present an attribute-based storage
system with securededuplication in a hybrid cloud setting, where a private cloud is
responsible for duplicate detection and a public cloud manages thestorage.
Compared with the prior data deduplication systems, our system has two
advantages. Firstly, it can be used to confidentiallyshare data with users by
specifying access policies rather than sharing decryption keys. Secondly, it
achieves the standard notion ofsemantic security for data confidentiality while
existing systems only achieve it by defining a weaker security notion. In addition,
we putforth a methodology to modify a ciphertext over one access policy into
ciphertexts of the same plaintext but under other access policieswithout revealing
the underlying plaintext.

EXISTING SYSTEM:

 In an existing storage system with secure deduplication, to store a file in the


cloud, a data provider generates a tag and a ciphertext. The data provider
uploads the tag and the ciphertext to the cloud. Upon receiving an
outsourcing request from a data provider for uploading a ciphertext and an
associated tag, the cloud runs a so-called equality checking algorithm, which
checks if the tag in the incoming request is identical to any tags in the
storage system. If there is a match, then the underlying plaintext of this
incoming ciphertext has already been stored and the new ciphertext is
discarded. It is apparent that such a system with a tag appended to the
ciphertext does not provide the standard notion of semantic security for data
confidentiality, because if the plaintexts can be predicated from their tags, an
adversary can always make a correct guess by computing the tag of a
plaintext and then testing it against the tag in the challenge phase in the
semantic security game.
 Douceur et al. proposed the first solution for balancing confidentiality and
efficiency in performing deduplication called convergent encryption, where
a message is encrypted under a message-derived key so that identical
plaintexts are encrypted to the same ciphertexts. In this case, if two users
upload the same file, the cloud server can discern the equal ciphertexts and
store only one copy of them.
 In order to formalize the precise security definition for convergent
encryption, Bellare, Keelveedhi and Ristenpart introduced a cryptographic
primitive named message locked encryption, and detailed several definitions
to capture various security requirements.
 Abadi et al. then strengthened the security definition by considering the
plaintext distributions depending on the public parameters of the schemes.

DISADVANTAGES OF EXISTING SYSTEM:

 Bethencourt, Sahai and Waters proposed the first CP-ABE construction, but
it is secure under the generic group model.
 Cheung and Newport presented a CPABE scheme that is proved to be secure
under the standard model, but it only supports the AND access structures.
 A CP-ABE system under more advanced access structures is proposed by
Goyal et al. based on the number theoretic assumption. In order to overcome
the limitation that the size of the attribute space is polynomially bounded in
the security parameter and the attributes are fixed ahead, Rouselakis and
Waters built a large universe CP-ABE system under the prime-order group

PROPOSED SYSTEM:

 In this paper, we present an attribute-based storage system which employs


ciphertext-policy attribute-based encryption (CP-ABE) and supports secure
deduplication. Our main contributions can be summarized as follows.
 Firstly, the system is the first that achieves the standard notion of semantic
security for data confidentiality in attribute-based deduplication systems by
resorting to the hybrid cloud architecture.
 Secondly, we put forth a methodology to modify a ciphertext over one
access policy into ciphertexts of the same plaintext but under any other
access policies without revealing the underlying plaintext.
 This technique might be of independent interest in addition to the application
in the proposed storage system.
 Thirdly, we propose an approach based on two cryptographic primitives,
including a zero-knowledge proof of knowledge and a commitment scheme,
to achieve data consistency in the system.
ADVANTAGES OF PROPOSED SYSTEM:

 We bring in our system a hybrid cloud architecture, which consists of a


private cloud responsible for tag checking and ciphertext regeneration and a
public cloud storing the ciphertexts.
 Our approach of producing such a proof makes use of the randomness reuse
technique in the generation of the tag and the ciphertext with an additional
zero-knowledge proof of knowledge (PoK) on the shared random coin in the
tag and the ciphertext. Therefore, it is impossible for an adversary to
perform duplicate faking attacks unless the adversary casually obtains the
content of the plaintext hidden in the ciphertext.

SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

 System : Pentium Dual Core.


 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB

SOFTWARE REQUIREMENTS:

 Operating system : Windows 7.


 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL

REFERENCE:

Hui Cui, Robert H. Deng, Yingjiu Li, and Guowei Wu, “Attribute-Based Storage
Supporting SecureDeduplication of Encrypted Data in Cloud”, IEEE
Transactions on Big Data, 2017.

You might also like