Authorized Deduplication: An Approach for Secure ...

9 downloads 0 Views 765KB Size Report
this encryption done with userГs password as encryption Ney. At administrator side ... toNen by using userГs password as decryption Ney. After decryption of ...
Available online at www.sciencedirect.com

ScienceDirect Procedia Computer Science 78 (2016) 815 – 823

,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\DQG3ULYDF\ ,&,63 'HFHPEHU 1DJSXU,1',$ 

$XWKRUL]HG'HGXSOLFDWLRQDQ$SSURDFKIRU6HFXUH&ORXG (QYLURQPHQW 

9LYHN:DJKPDUHD6PLWD.DSVHE  b

a Student, YCCE, Nagpur-41110, India Assistant Professor, YCCE, Nagpur-41110, India

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¶V SODLQWH[W RU XVHU¶V GHFU\SWHGGDWD ‹7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). 3HHUUHYLHZXQGHUUHVSRQVLELOLW\RIRUJDQL]LQJFRPPLWWHHRIWKH,&,63 Peer-review under responsibility of organizing committee of the ICISP2015  Keywords: Deduplication; privacy preserving; convergent encryption technique

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¶VFORXGVHUYLFHSURYLGHUVRIIHUFOLHQWGLIIHUHQWW\SHRI VHUYLFHVVXFKDVODUJHVWRUDJHVSDFHDQGSDUDOOHOFRPSXWLQJRIUHVRXUFHVDWYHU\FKHDSSULFH'DWDGHGXSOLFDWLRQLQ WKHFORXGLVDQHZWHFKQRORJ\WKDWZRUNVRQUDSLGO\LQFUHDVLQJDPRXQWRIGLJLWDOGDWDLQFORXGGDWDVWRUDJHWKHVH WHFKQLTXHVXVHGIRULGHQWLI\LQJUHGXQGDQWGDWD7KHUHVXOWLQJXQLTXHVLQJOHFRS\LVVWRUHGDQGZLOOWKHQVHUYHWRDOO RIWKHDXWKRUL]HGXVHUV>@  

)LJ$UFKLWHFWXUHRI6\VWHP



 1.1 User $Q DXWKRUL]HG XVHU ZKRZDQWV WRRXWVRXUFH DILOHRQ FORXG HQYLURQPHQW DQG V\VWHP SURYLGH DXWKHQWLFDWLRQ WR WKH XVHUWRHQWHULQWKHV\VWHPWRXSORDGGDWDZLWKSDUWLFXODUVHWRISULYLOHJHVIRUDFFHVVLQJWKHXSORDGHGILOHV  1.2 Public cloud  $ SXEOLF FORXG LV D VWRUDJH VSDFH ZKLFK DOORZV VWRULQJ ILOHV RI XVHUV ,Q WKLV V\VWHP ZH LQFOXGH DXWKRUL]DWLRQ GHGXSOLFDWLRQ WHFKQLTXH ZKLFK QRW DOORZV VWRULQJ GXSOLFDWH FRSLHV RI ILOH  )LOHV ZKLFK DUH XSORDGHG DUH LQ WKH HQFU\SWHGIRUPDQGWKRVHILOHRQO\GHFU\SWHGE\DXWKRUL]HGXVHURQO\  1.3 Administrator $GPLQLVWUDWRULV73$ZRUNDVH[SHUWLVHZKLFKLVKDYLQJFDSDELOLWLHVZKHUHXVHUGRHVQRWKDYHWRWUXVWWRDFFHVVWKH FORXG VWRUDJH VHUYLFHV UHOLDELOLW\ RQ EHKDOI RI WKH XVHU UHTXHVW 3ULYDWH NH\V IRU SULYLOHJHV DUH PDQDJHG E\ DGPLQLVWUDWRUWRJHWILOHWRNHQUHTXHVWVIURPXVHU 

Vivek Waghmare and Smita Kapse / Procedia Computer Science 78 (2016) 815 – 823

817

,Q WKH DERYH)LJ VKRZ WKH DUFKLWHFWXUH RI DXWKRULVHG GHGXSOLFDWLRQ V\VWHP IRUGXSOLFDWH FKHFNLQJ XVHU VHQGV D WRNHQRIVHOHFWHGILOHWRZDUGVDGPLQLVWUDWRU$WRNHQZKLFKDUHVHQGVWRZDUGVDGPLQLVWUDWRULVLQHQFU\SWHGIRUPDW WKLV HQFU\SWLRQ GRQH ZLWK XVHU¶V SDVVZRUG DV HQFU\SWLRQ NH\ $W DGPLQLVWUDWRU VLGH DGPLQLVWUDWRU GHFU\SWHG WKLV WRNHQE\XVLQJXVHU¶VSDVVZRUGDVGHFU\SWLRQNH\$IWHUGHFU\SWLRQRIWRNHQDGPLQLVWUDWRUFKHFNWKLVWRNHQLQWKH GDWDEDVH LI WRNHQ SUHVHQW LQ GDWDEDVH WKHQ VHQGV DQ DFNQRZOHGJHPHQW DV GXSOLFDWH ILOH IRXQG VR ILOH FDQ¶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¶ DQG FRQIHUHQFHV¶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¶GDWDE\HQFU\SWLQJLWZLWKFOLHQWV¶NH\VDQGDFKLHYHVHFXUHGHGXSOLFDWLRQLQHQFU\SWHGGDWDILOHE\ SUR[\UHHQFU\SWLRQ  ,Q>@WKHDXWKRUVSURYLGHDV\VWHPZKLFKFRQVLVWVRIEORFNOHYHOGHGXSOLFDWLRQFRQYHUJHQWHQFU\SWLRQWHFKQLTXHV 7KH\ DOVR XVHG PHWDGDWD PDQDJHU IRU NH\ PDQDJHPHQW 7KH DXWKRUV GHVLJQHG D V\VWHP ZKLFK DFKLHYHV FRQILGHQWLDOLW\DQGHQDEOHVEORFNOHYHOGHGXSOLFDWLRQDWWKHVDPHWLPH 7KHLUV\VWHPLVEXLOWRQWRSRIFRQYHUJHQW

818

Vivek Waghmare and Smita Kapse / Procedia Computer Science 78 (2016) 815 – 823

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ymmetric Encryption $HQFU\SWLRQWHFKQLTXHZKHUHVDPHNH\NLVXVHGIRUHQFU\SWLRQDVZHOODVIRUGHFU\SWLRQRIGDWD>@$V\PPHWULF HQFU\SWLRQVFKHPHFRQVLVWVRIWKUHHSULPLWLYHIXQFWLRQVZKLFKDUHVKRZEHORZ x x x

.H\*HQ Ȝ ,WLVWKHNH\JHQHUDWLRQDOJRULWKPWKDWJHQHUDWHVNH\NXVLQJVHFXULW\SDUDPHWHUȜ (QF k0 7KLVLVWKHV\PPHWULFHQFU\SWLRQDOJRULWKPWKDWWDNHVWKHVHFUHWkDQGPHVVDJH0DQGWKHQ JLYHRXWSXWDVWKHFLSKHUWH[W& 'HF k& 7KLVLVWKHV\PPHWULFGHFU\SWLRQDOJRULWKPWKDWWDNHVWKHVHFUHWk DQGFLSKHUWH[WC DQGWKHQ JLYHRXWSXWDVRULJLQDOPHVVDJHM>@

3.2. De-duplication $KDVKLQJIXQFWLRQFDQEHXVHGWRUHWXUQDXQLTXHNH\IRUDILOHEDVHGRQO\RQWKHFRQWHQWVRIWKHGDWDLIWZRILOHLV KDYLQJWKHVDPHGDWDVRWKHQWKHKDVKLQJIXQFWLRQZLOOUHWXUQWKHVDPHNH\IRUWKHVHWZRILOHV>@,IWKLVNH\LVXVHG DVWKHLQGH[IRUVWRULQJILOHWKHQDQ\DWWHPSWWRVWRUHPXOWLSOHFRSLHVRIWKHVDPHILOHZLOOEHGHWHFWHGLPPHGLDWHO\ >@ 3.3. Convergent Encryption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oken Generation 7KHWRNHQJHQHUDWLRQLVDIXQFWLRQZKHUHDKDVKYDOXHRIILOHLVFDOFXODWHG+DVKIXQFWLRQSURGXFHVDXQLTXHYDOXH IRUHDFKILOHLQWKHDXWKRUL]HGGHGXSOLFDWLRQV\VWHPZHXVHGD6+$IRUKDVKYDOXHFDOFXODWLRQRIILOH,QEHORZ

819

Vivek Waghmare and Smita Kapse / Procedia Computer Science 78 (2016) 815 – 823

)LJVKRZKRZWRNHQLVJHQHUDWHGIRUDILOHDYDULDEOHOHQJWKILOHLVSDVVHVWKURXJKFU\SWRJUDSKLFKDVKIXQFWLRQ+ DQGSURGXFHIL[HGOHQJWKYDOXHWKDWLVWRNHQIRUWKHJLYHQILOH 

)LJ7RNHQ*HQHUDWLRQ)XQFWLRQ 



$XWKRUL]HG'HGXSOLFDWLRQ6\VWHP 4.1. User Registration ,QWKHEHORZ)LJVKRZDXVHUUHJLVWUDWLRQSURFHVVLQWKLVFRPPXQLFDWLRQLVGRQHEHWZHHQDGPLQLVWUDWRUDQGQHZ XVHU $IWHU VXFFHVVIXO FRPSOHWLRQ RI WKLV SURFHVV XVHU FDQ DEOH WR XSORDG DQG GRZQORDG ILOH IURP SXEOLF FORXG VWRUDJH $OO GHWDLOV ZKLFK DUH HQWHU GXULQJ UHJLVWUDWLRQ SURFHVV WKLV GHWDLO LV QRW VKDUH E\ WKH DGPLQLVWUDWRU WR DQ\ WKLUG SDUW\ 8VHU UHJLVWUDWLRQ SDJH FRQWDLQ LQIRUPDWLRQ VXFK XVHUQDPH FRQWDFW QR HPDLO LG HWF RI XVHU 7R JHW UHJLVWHUHGXVHUUHTXLUHGWRHQWHUDOOGHWDLOVFRPSXOVRU\

 

)LJ8VHU5HJLVWUDWLRQ0RGXOH



820

Vivek Waghmare and Smita Kapse / Procedia Computer Science 78 (2016) 815 – 823

$XWKRUL]HG'HGXSOLFDWLRQ6\VWHP 5.1. User Registration ,QWKHEHORZ)LJVKRZDXVHUUHJLVWUDWLRQSURFHVVLQWKLVFRPPXQLFDWLRQLVGRQHEHWZHHQDGPLQLVWUDWRUDQGQHZ XVHU $IWHU VXFFHVVIXO FRPSOHWLRQ RI WKLV SURFHVV XVHU FDQ DEOH WR XSORDG DQG GRZQORDG ILOH IURP SXEOLF FORXG VWRUDJH $OO GHWDLOV ZKLFK DUH HQWHU GXULQJ UHJLVWUDWLRQ SURFHVV WKLV GHWDLO LV QRW VKDUH E\ WKH DGPLQLVWUDWRU WR DQ\ WKLUG SDUW\ 8VHU UHJLVWUDWLRQ SDJH FRQWDLQ LQIRUPDWLRQ VXFK XVHUQDPH FRQWDFW QR HPDLO LG HWF RI XVHU 7R JHW UHJLVWHUHGXVHUUHTXLUHGWRHQWHUDOOGHWDLOVFRPSXOVRU\

)LJ8VHU5HJLVWUDWLRQ0RGXOH 



4.2 File Uploading  ,QEHORZ)LJVKRZDSURFHVVIRUILOHXSORDGLQJ$UHJLVWHUHGXVHUHQWHUVORJLQLGDQGSDVVZRUGDIWHUVXFFHVVIXO DWWHPSWXVHULVUHDG\WRXSORDGILOH$QXVHUVHOHFWDILOHWRXSORDGRQFORXGILUVWKDVKYDOXHLVFDOFXODWHLHWRNHQ IRUVHOHFWHGILOHWKLVWRNHQLVVHQGVWRZDUGVDGPLQLVWUDWRU7KLVWRNHQLVHQFU\SWHGILUVWZLWKXVHUSDVVZRUGDQGWKHQ VHQGVIRUGXSOLFDWHFKHFNLQJWRZDUGVDGPLQLVWUDWRU$WDGPLQLVWUDWRUVLGHWKLVWRNHQVLVGHFU\SWHGILUVWWKHQFKHFN WKLVWRNHQLQGDWDEDVHDIWHUFKHFNLQJDGPLQLVWUDWRUVHQGVDFNQRZOHGJPHQWWRZDUGVXVHU 

)LJ)LOH8SORDGLQJ0RGXOH



821

Vivek Waghmare and Smita Kapse / Procedia Computer Science 78 (2016) 815 – 823

4.3 Encryption ,QWKHEHORZ)LJ6KRZKRZSULYDF\SUHVHUYLQJFDQDFKLHYHLQDXWKRUL]HGGHGXSOLFDWLRQV\VWHP7KHFRQYHUJHQW HQFU\SWLRQWHFKQLTXHVLVXVHGWRHQFU\SWILOHVRWRNHQZKLFKLVJHQHUDWHGIURPILOHLVVHOHFWDVDNH\6DPHWRNHQLV VHQGWRZDUGVDGPLQLVWUDWRUIRUGXSOLFDWHFKHFNWKURXJKSXEOLFQHWZRUNVRWRSURYLGHVHFXULW\$VHFXULW\LVSURYLGH WRWRNHQLQSXEOLFQHWZRUNE\HQFU\SWLQJWKLVWRNHQZLWKXVHU¶VSDVVZRUG,QEHORZILJXUHVKRZWKHUHDUHWZRNH\V ZKLFKDUHWRNHQDVNH\DQGRWKHURQHLVXVHU¶VSDVVZRUGDVNH\





4.4. Checkfor









)LJ(QFU\SWLRQ

Duplicates

,QEHORZ)LJVKRZVIRUGXSOLFDWHILOHFKHFNLQJXVHUJHQHUDWHDILOHKDVKYDOXHLHWRNHQIRUWKHVHOHFWHGILOHDQG VHQGVWKLVILOHWRNHQLQHQFU\SWHGIRUPDWWRZDUGVDGPLQLVWUDWRUIRUGXSOLFDWHFKHFN$GPLQLVWUDWRULVKDYLQJGDWDEDVH RIILOHWRNHQDQGXVHU¶VSDVVZRUGLHHQFU\SWLRQNH\VIRUWRNHQ,IQRGXSOLFDWHIRXQGDIWHUFRPSDULVRQLQGDWDEDVH WKHQ VHOHFWHG ILOH LV UHDG\ IRU XSORDG RQ SXEOLF FORXG ,I GXSOLFDWH LV GHWHFWHG WKHQ DGPLQLVWUDWRU VHQGV DFNQRZOHGJPHQWWRZDUGVWKHXVHUWKDWILOHDOUHDG\SUHVHQWRQSXEOLFFORXG

)LJ'XSOLFDWHILOHFKHFNLQJ 





822

Vivek Waghmare and Smita Kapse / Procedia Computer Science 78 (2016) 815 – 823

(YDOXDWLRQ3DUDPHWHUV ,QDXWKRUL]HGGHGXSOLFDWLRQV\VWHPZHHYDOXDWHWKHRYHUKHDGE\YDU\LQJGLIIHUHQWIDFWRUVVXFKILOHVL]HQXPEHURI VWRUHGILOHDQGGHGXSOLFDWLRQUDWHHWFIDFWRUVZKLFKDUHPHQWLRQVDUHJLYHQEHORZ x x

x

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¶VVHQVLWLYHGDWDDUHVHFXUHIURPERWKLQVLGHUDQGRXWVLGHUDWWDFNV  5HIHUHQFHV  

'X 0HQJ ³'DWD 6HFXULW\ LQ &ORXG &RPSXWLQJ´ ,Q SURFHHGLQJ RI WKH WK ,QWHUQDWLRQDO &RQIHUHQFH RQ &RPSXWHU 6FLHQFH DQG (GXFDWLRQ&RORPERSS  )DZD]6$Q$Q]L$\HG$6DOPDQ1RE\.-RFRE-\RWL6RQL³7RZDUGV5REXVW6FDODEOHDQG6HFXUH1HWZRUN6WRUDJHLQ&ORXG &RPSXWLQJ´ ,Q SURFHHGLQJ RI WKH WK ,QWHUQDWLRQDO &RQIHUHQFH RQ 'LJLWDO LQIRUPDWLRQ DQG &RPPXQLFDWLRQ 7HFKQRORJ\ DQG LW¶V $SSOLFDWLRQ%DQJNRNSS  6KDL+DOHYL 'DQQ\ +DUQLN %HQQ\ 3LQNDV DQG $OH[DQGUD 6KXOPDQ3HOHJ ³3URRIV RI 2ZQHUVKLS LQ 5HPRWH 6WRUDJH 6\VWHPV´ LQ SURFHHGLQJRIWKHWK$&0&RQIHUHQFHRQ&RPSXWHUDQG&RPPXQLFDWLRQ6HFXULW\1HZ