Access Policyâ€™s Over Encrypted Cloud Storage for Secure Deduplication
Keywords:Access policy, CP-ABE, deduplication, cloud storage.
Attribute-Based Encryption (ABE) is a basic concept that considers public-key cryptography. Ciphertext-Policy ABE (CP-ABE) is one of the approaches used by ABE for data sharing in the cloud. In CP-ABE scheme, each userâ€™s private key has a set of attributes and then the user decrypts a ciphertext if it holds a matching key. Our proposed system provides an extension to CP-ABE by implementing AES. AES uses a symmetric encryption key algorithm for a same set of keys. Our system provides a higher security through AES because of its complexity and helps in generating the content key . This key is used during the encryption of the original file over the cloud. Our methodology also focuses on deduplication to provide less consumption of cloud storage over the cloud. Another advantage of using this system is to provide an efficient way of data access via access policies for a certain set of credentials.
 Quick D, Martini B & Choo KR, â€œCloud Storage Forensicsâ€, Syngress Publishing / Elsevier, (2014).
 Choo KR, Domingo-Ferrer J & Zhang L, â€œCloud cryptography: Theory, practice and future research directionsâ€, Future Generation Comp. Syst., (2016), pp.51â€“53.
 Choo KR, Herman M, Iorga M & Martini B, â€œCloud forensics: State-of-the-art and future directionsâ€, Digital Investigation, (2016), pp.77â€“78.
 Yang Y, Zhu H, Lu H, Weng J, Zhang Y & Choo KR, â€œCloud based data sharing with fine-grained proxy re-encryptionâ€, Pervasive and Mobile Computing, (2016), pp.122â€“134.
 Sahai A & Waters B, â€œFuzzy identity-based encryptionâ€, Advances in Cryptology â€“EUROCRYPT, (2005), pp.457â€“473.
 Zhu B, Li K & Patterson RH, â€œAvoiding the disk bottleneck in the data domain deduplication file systemâ€, 6th USENIX Conference on File and Storage Technologies, FAST, (2008), pp.269â€“282.
 Bellare M, Keelveedhi S & Ristenpart T, â€œMessage-locked encryption and secure deduplicationâ€, Advances in Cryptology â€“ EUROCRYPT, Springer, (2013), pp.296â€“312.
 Abadi M, Boneh D, Mironov I, Raghunathan A & Segev G, â€œMessage-locked encryption for lock-dependent messagesâ€, Advances in Cryptology - CRYPTO, Springer, (2013), pp.374â€“391.
 Keelveedhi S, Bellare M & Ristenpart T, â€œDupless: Serveraided encryption for deduplicated storageâ€, Proceedings of the 22th USENIX Security Symposium, (2013), pp.179â€“194.
 Bellare M & Keelveedhi S, â€œInteractive message-locked encryption and secure deduplicationâ€, Public-Key Cryptography - PKC, Springer, (2015), pp.516â€“538.
 Hui C, Robert HD &Yingjiu L, â€œAttribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloudâ€, IEEE Transactions on Big Data, (2016).
 Wu EF & Okamoto T, â€œSecure integration of asymmetric and symmetric encryption schemesâ€, J. Cryptology, (2013), pp.80â€“101.
 Quick D & Choo KR, â€œGoogle drive: Forensic analysis of data remnantsâ€, J. Network and Computer Applications, (2014), pp.179â€“ 193.
 Goyal V, Pandey O, Sahai A & Waters B, â€œAttribute-based encryption for fine-grained access control of encrypted dataâ€, ACM Conference on Computer and Communications Security, CCS, Springer, (2006), pp.89â€“98.
 Ostrovsky R, Sahai A & Waters B, â€œAttribute-based encryption with non-monotonic access structuresâ€, ACM Conference on Computer and Communications Security, CCS, ACM, (2007), pp.195â€“203.
 Lewko AB & Waters B, â€œUnbounded HIBE and attribute based encryptionâ€, Advances in Cryptology-EUROCRYPT, Springer (2011), pp.547â€“567.
 Bethencourt J, Sahai A & Waters B, â€œCiphertext-policy attribute-based encryptionâ€, IEEE Symposium on Security and Privacy (S&P), (2007), pp.321â€“334.
 Cheung L & Newport CC, â€œProvably secure ciphertext policy ABEâ€, ACM Conference on Computer and Communications Security, CCS, ACM, (2007), pp.456â€“465.
 Rouselakis Y & Waters B, â€œPractical constructions and new proof methods for large universe attribute-based encryptionâ€, ACM SIGSAC Conference on Computer and Communications Security, ACM, (2013), pp.463â€“474.
 Douceur JR, Adya A, Bolosky WJ, Simon D & Theimer M, â€œReclaiming space from duplicate files in a serverless distributed file systemâ€, ICDCS, (2002), pp.617â€“624.
 Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication, Vol.197, (2001).
 Sai Prasad K, Chandra Sekhar Reddy N, Rama B, Soujanya A & Ganesh D, â€œAnalyzing and Predicting Academic Performance of Students Using Data Mining Techniquesâ€, Journal of Advanced Research in Dynamical and Control Systems, Vol.10, No.7, (2018), pp.259-266.
 Daemen J & Rijmen V, â€œAES proposal: Rijndaelâ€, (1999).
 Z Iskakova, M Sarsembayev, Z Kakenova (2018). Can Central Asia be integrated as asean? OpciÃ³n, AÃ±o 33. 152-169.
 G Cely Galindo (2017) Del Prometeo griego al de la era-biÃ³s de la tecnociencia. Reflexiones bioÃ©ticas OpciÃ³n, AÃ±o 33, No. 82 (2017):114-133