Please use this identifier to cite or link to this item:
Title: Secure data access on untrusted storage
Authors: Mediana
Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption
DRNTU::Engineering::Computer science and engineering::Information systems::Information storage and retrieval
Issue Date: 2015
Abstract: In advent of modern IT infrastructures, cloud storage services are gaining popularity due to its numerous benefits such as low cost, convenience, scalability and collaboration. People are increasingly using cloud storage services made available by companies such as Google, Dropbox, and Amazon to store their data on these service provider’s data centers. In the face of its benefits, there are still some issues that need to be considered prior using the service such as storage space efficiency, data privacy and security. Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers save storage space by eliminates the copies of redundant data, and encrypted data can ensure the confidentiality of customer’s data both in transit and at rest. However, deduplication that works on detecting identical data does not work well with encrypted data provided by conventional encryption. Encryption of the same data using different key (by different subscribers) will result in different ciphertext and cause cloud storage providers unable to carry out deduplication. In this project, a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises is implemented. Subscriber encrypts data with data-encryption key obtained from key server via various key-management schemes, one of which uses homomorphic-xor operation. The main contributions of this project are (1) With a key server deployed at cloud service provider premises, it will not only deduplicate data from particular domain but also for its entire client base including public and different enterprise users - higher storage savings, (2) Data owners still maintain exclusive control of their data and data-encryption key, i.e. cloud service provider has no access to any of it - strong confidentiality guarantees. The experiment conducted shows that clients experience minor storage overhead and latency by using our scheme for encrypted data compare using the storage service for plaintext data.
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
  Restricted Access
FYP Report3.06 MBAdobe PDFView/Open

Page view(s) 50

checked on Oct 21, 2020

Download(s) 50

checked on Oct 21, 2020

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.