抽象的

Revocation and Security Based Ownership Deduplication of Convergent Key Creating in Cloud

P.Gokulraj , K.Kiruthika Devi

Data deduplication is a technique for decreasing the amount of storage space for an organization needs to save its data. In many organizations, the storage systems have duplicate copies of many pieces of data and its information. For example, an equivalent file may be saved in several places by many users, or two or more files that aren't equivalent may still include much of the same data. Deduplication remove these extra copies by saving just one copy of the data and changing the other copies with pointers that lead back to the original copy. In this paper first attempt to conventionally address the problem of resolve dynamic and reliable key management in deduplication. In the baseline approach each user holds a separate master key for encrypting the convergent keys and redistributes them to the cloud. And we propose a method Deckey, a new construction in which users are not need to manage any keys on their own. Security analyses establish that Deckey is secure in terms of the exposition specified in the proposed security model. As a proof of concept, we implement Deckey using the Ramp secret sharing scheme and determine that Deckey acquire limited overhead on realistic environments.

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

学术钥匙
研究圣经
引用因子
宇宙IF
参考搜索
哈姆达大学
世界科学期刊目录
学者指导
国际创新期刊影响因子(IIJIF)
国际组织研究所 (I2OR)
宇宙

查看更多