Data Deduplication And Data Sharing With Delegated Access Control
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2017 by IJCTT Journal|
|Year of Publication : 2017|
|Authors : Ms. Triveni Bhalerao, Prof. N. P. Kulkarni|
|DOI : 10.14445/22312803/IJCTT-V46P112|
Ms. Triveni Bhalerao, Prof. N. P. Kulkarni "Data Deduplication And Data Sharing With Delegated Access Control". International Journal of Computer Trends and Technology (IJCTT) V46(2):56-61, April 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Nowadays Data sharing, maintenance, its security are major challenges in global world. User in the data sharing system upload their file with the encryption using private key. This property is especially important to any large scale data sharing system, as any user leak the key information then it will become difficult for the data owner to maintain security of the information. In this system provide a concrete and efficient instantiate of scheme, prove its security and provide an implementation to show its practicality. There are lots of challenges for data owner to share their data on servers or cloud. There are different solutions to solve these problems. These techniques are very much critical to handle key shared by the data owner. This system will introduce how to reduce burden of data owner, authenticate those who have the access to the data on cloud. SHA algorithm is used by the TTP to generate the key and that key will get share to user as well as the owner. The TTP module receives encrypted file F using AES Algorithm from the data owner and computes hash value using MD-5 algorithm. It stores key in its database which will be used during the dynamic operations and to determine the cheating party in the system (CSP or Owner). Trusted Third Party sends file to Cloud Service Provider to store data on cloud.
 Boyang Wang, Baochun Li and Hui Li, “Panda: Public Auditing for Shared Datawith Efficient User Revocation in the Cloud”, in IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, pp. 92- 106, 2014.
 Cheng-Kang Chu, Sherman S.M. Chow, Wen-GueyTzeng, Jianying Zhou, and Robert H. Deng, “Key-Aggregate Cryptosystem for ScalableData Sharing in Cloud Storage", in IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, pp. 468-477, 2014.
 Seung-Hyun Seo,Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino, “An Efficient Certificateless Encryption forSecure Data Sharing in Public Clouds”, in IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 9, pp. 2107-2119, 2014.
 Mohamed Nabeel and Elisa Bertino, “Privacy Preserving Delegated AccessControl in Public Clouds”, in IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING", VOL. 26, NO. 9, pp.2268-2280, 2014.
 Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, and Qi Xie, “A DFA-Based Functional Proxy Re-EncryptionScheme for Secure Public Cloud Data Sharing”, in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, pp. 1667-1680, 2014.
 Jiawei Yuan and Shucheng Yu, “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification", in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, pp. 1717-1726, 2014.
 Tao Jiang and Jiafeng Ma, “‘Public Integrity Auditing for Dynamic Data Sharing With Multiuser Group Modification", in IEEE TRANSACTIONS ON TECHNOLOGY, VOL. 6, NO.7, pp.456-492, 2014.
 Jiawei Yuan and Shucheng Yu, Member, IEEE proposed a system on “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification", in IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 4, NO. 2, pp. 1168-1207, 2014.
 C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy preserving public auditing for secure cloud storage”, in IEEE TRANS. COMPUT., vol. 62, no. 2, pp. 362–375, Feb. 2013.
 Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security", in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, pp. 1667-1680, 2014.
AES, Data Security, Deduplication, Cloud, Encryption, Key, Recovery.