This paper is published in Volume-3, Issue-1, 2017
Area
Cloud Computing
Author
Nilam Vijaykumar Patil, Dr. B. K Sarkar
Org/Univ
Padmabhooshan Vasantdada Patil Institute Of Technology, Pune, Maharashtra, India
Keywords
Convergent Encryption, Private Sharing, Storage System, Cloud Environment.
Citations
IEEE
Nilam Vijaykumar Patil, Dr. B. K Sarkar. Secure Convergent Key and Deduplication using Distributed Convergent Key Management, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Nilam Vijaykumar Patil, Dr. B. K Sarkar (2017). Secure Convergent Key and Deduplication using Distributed Convergent Key Management. International Journal of Advance Research, Ideas and Innovations in Technology, 3(1) www.IJARIIT.com.
MLA
Nilam Vijaykumar Patil, Dr. B. K Sarkar. "Secure Convergent Key and Deduplication using Distributed Convergent Key Management." International Journal of Advance Research, Ideas and Innovations in Technology 3.1 (2017). www.IJARIIT.com.
Nilam Vijaykumar Patil, Dr. B. K Sarkar. Secure Convergent Key and Deduplication using Distributed Convergent Key Management, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Nilam Vijaykumar Patil, Dr. B. K Sarkar (2017). Secure Convergent Key and Deduplication using Distributed Convergent Key Management. International Journal of Advance Research, Ideas and Innovations in Technology, 3(1) www.IJARIIT.com.
MLA
Nilam Vijaykumar Patil, Dr. B. K Sarkar. "Secure Convergent Key and Deduplication using Distributed Convergent Key Management." International Journal of Advance Research, Ideas and Innovations in Technology 3.1 (2017). www.IJARIIT.com.
Abstract
Data deduplication is a specific form of compression where redundant data is eliminated and has been used in cloud computing to improve storage utilization. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored. In the traditional encryption, different users required to encrypt their data with own keys. So different ciphertexts are produced, it makes difficult to deduplication. The new scheme has been proposed, convergent encryption, to protect the confidentiality of sensitive data while making deduplication is possible. In this paper, this convergent key managers efficiently and reliability. Firstly in this paper baseline approach is used in which a master key means the encrypted convergent key is kept individually and outsourcing them to cloud. Each user has a master key, increase the enormous number of keys. And users also want to protect the master key. A new approach is proposed in which Dickey is used in which user share key on multiple servers, he do not require manage the key. Ramp Secret Sharing scheme is used to implement Dickey in which each key distributed on multiple servers.