Secure Cloud Data Deduplication with Efficient Re-encryption


The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary in order to keep up with the exponential growth of data. Numerous secure data deduplication schemes have been designed and put into practice in a variety of settings in order to provide an additional layer of protection for the confidentiality of the sensitive data stored by users who make use of the outsourced storage mode. Among these schemes, secure and efficient re-encryption for encrypted data deduplication has attracted the attention of a large number of academics, and a large number of solutions have been designed to support dynamic ownership management. In this paper, we focus on the re-encryption deduplication storage system, and we show that the recently designed lightweight rekeying-aware encrypted deduplication scheme (REED), which is vulnerable to an attack that we call the stub-reserved attack, is vulnerable to that attack. In addition, we suggest a method for the safe deduplication of data that also features an effective re-encryption. This method is founded on the convergent all-or-nothing transform (CAONT), and it uses randomly sampled bits from the Bloom filter. Our system is able to withstand the stub-reserved attack thanks to the inherent property of the one-way hash function, and we can guarantee the data privacy of sensitive information belonging to data owners. In addition, data owners are not required to re-encrypt the entire package through the CAONT; rather, they are only required to re-encrypt a small portion of it. This effectively reduces the computational overhead that the system must deal with. In conclusion, the results of the security analysis and the experiments show that our scheme is both safe and effective when it comes to re-encryption.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.
PROJECT TITLE : PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment ABSTRACT: The Vehicular Cloud Environment, also known as VCE, is an entirely novel research

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry