SlideShare a Scribd company logo
KeyD: Secure Key-Deduplication with
Identity-Based Broadcast Encryption
A.Ramya(T19301).
• Abstract:
• Existing System:
• Proposed System:
• System Arichitecture:
• Modules:
• Hardware Requriments:
• Software Requriments:
ABSTRACT
• In this paper, we design a novel client-side deduplication
protocol named KeyD without such an independent key
management server by utilizing the identity-based
broadcast encryption (IBBE) technique.
• Users only interact with the cloud service provider (CSP)
during the process of data upload and download.
• Security analysis demonstrates that KeyD ensures data
confidentiality and convergent key security, and well
protects the ownership privacy simultaneously
EXISTING SYSTEM
In this system ,In which the data stored cloud must be encrypted as before
stored in the cloud space, that can be encrypted by using the DES data
encryption standerd.
employs the Ramp secret sharing scheme (RSSS) to construct secret shares for
the convergent keys and distribute them across multiple independent Key
Management Cloud Service Providers (KM-CSPs).
To recover data copies, a user must access a minimum number of key servers
through authentication and obtain the secret shares to reconstruct the
convergent keys.
The premise of the scheme security is that the number of colluded KM-CSPs
is not more than a predefined threshold, such that a convergent key cannot
be guessed by the colluded KM-CSPs.
DISADVANTAGES OF EXISTING SYSTEM
• There exists any duplication while storage into it.
• Occupy a number of storage for the same amount of
data.
PROPOSED SYSTEM
• In this paper, we construct a secure deduplication scheme to
manage convergent keys.
• In our proposed system, the file uploaded in the cloud should
avoid duplicated files.
• We are using convergent key encryption which completely
avoids the duplicated files stored for a number of times.
• Security analysis demonstrates that our scheme ensures the
confidentiality of data files and the security of convergent
keys.
ADVANTAGES OF PROPOSED SYSTEM
• Reduces the storage and avoid duplicate files.
• Maintain single owenership for each file.
• Confidentiality of files while upload and download
• Reduces the storage space and exact retrieval of files.
SYSTEM ARCHITECTURE
modules
• Data owner:
• CSP:
• Kgc:
HARDWARE REQUIREMENTS
• System : Pentium Dual Core.
• Hard Disk : 120 GB.
• Monitor : 15’’ LED
• Input Devices : Keyboard, Mouse
• Ram : 1 GB
SOFTWARE REQUIREMENTS
• Operating system : Windows 7.
• Coding Language : JAVA.
• Tool : Netbeans 7.2.1
• Database : MYSQL
REFERENCE
• Ling Liu, Yuqing Zhang and Xuejun Li, “KeyD: Secure
Key-Deduplication with Identity-Based Broadcast
Encryption”, IEEE Transactions on Cloud Computing,
2019.
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption

More Related Content

DOC
A hybrid cloud approach for secure authorized deduplication
PPTX
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
PDF
Psdot 12 a secure erasure code-based cloud storage
PPTX
Secure deduplicaton with efficient and reliable convergent
PPTX
key aggregate cryptosystem for scalable data sharing in cloud
PPTX
multiple encryption in clouud computing
PPTX
Sql_DG_presentation.pptx
PDF
Cloud Computing Storage With CubeXS Weatherly...
A hybrid cloud approach for secure authorized deduplication
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
Psdot 12 a secure erasure code-based cloud storage
Secure deduplicaton with efficient and reliable convergent
key aggregate cryptosystem for scalable data sharing in cloud
multiple encryption in clouud computing
Sql_DG_presentation.pptx
Cloud Computing Storage With CubeXS Weatherly...

Similar to KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption (20)

DOCX
PPTX
Trusted DB a trusted hardware based database with privacy and data confidenti...
DOCX
Attribute based encryption with verifiable outsourced decryption
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOCX
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
PPTX
semantic search
PPTX
Securing your azure web app with asp.net core data protection
PPT
ITDCC05.ppt
DOCX
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
DOCX
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
DOCX
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
DOCX
a hybrid cloud approach for secure authorized reduplications
DOCX
Attribute based encryption with verifiable outsourced decryption
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
PPTX
Presentation (6).pptx
PDF
IJSRED-V2I2P10
PDF
AWS Well Architected-Info Session WeCloudData
PPTX
Saa s multitenant database architecture
DOCX
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
Trusted DB a trusted hardware based database with privacy and data confidenti...
Attribute based encryption with verifiable outsourced decryption
Key aggregate cryptosystem for scalable data sharing in cloud storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
semantic search
Securing your azure web app with asp.net core data protection
ITDCC05.ppt
JPD1418 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data C...
2014 IEEE DOTNET DATA MINING PROJECT Trusteddb a-trusted-hardware-based-datab...
IEEE 2014 DOTNET DATA MINING PROJECTS Trusted db a-trusted-hardware-based-dat...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
a hybrid cloud approach for secure authorized reduplications
Attribute based encryption with verifiable outsourced decryption
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
Presentation (6).pptx
IJSRED-V2I2P10
AWS Well Architected-Info Session WeCloudData
Saa s multitenant database architecture
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
Ad

Recently uploaded (20)

PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPT
Quality review (1)_presentation of this 21
PPTX
Introduction to machine learning and Linear Models
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
annual-report-2024-2025 original latest.
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PDF
Mega Projects Data Mega Projects Data
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
climate analysis of Dhaka ,Banglades.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Quality review (1)_presentation of this 21
Introduction to machine learning and Linear Models
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Acceptance and paychological effects of mandatory extra coach I classes.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
annual-report-2024-2025 original latest.
Fluorescence-microscope_Botany_detailed content
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Galatica Smart Energy Infrastructure Startup Pitch Deck
Mega Projects Data Mega Projects Data
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Reliability_Chapter_ presentation 1221.5784
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Ad

KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption

  • 1. KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption A.Ramya(T19301).
  • 2. • Abstract: • Existing System: • Proposed System: • System Arichitecture: • Modules: • Hardware Requriments: • Software Requriments:
  • 3. ABSTRACT • In this paper, we design a novel client-side deduplication protocol named KeyD without such an independent key management server by utilizing the identity-based broadcast encryption (IBBE) technique. • Users only interact with the cloud service provider (CSP) during the process of data upload and download. • Security analysis demonstrates that KeyD ensures data confidentiality and convergent key security, and well protects the ownership privacy simultaneously
  • 4. EXISTING SYSTEM In this system ,In which the data stored cloud must be encrypted as before stored in the cloud space, that can be encrypted by using the DES data encryption standerd. employs the Ramp secret sharing scheme (RSSS) to construct secret shares for the convergent keys and distribute them across multiple independent Key Management Cloud Service Providers (KM-CSPs). To recover data copies, a user must access a minimum number of key servers through authentication and obtain the secret shares to reconstruct the convergent keys. The premise of the scheme security is that the number of colluded KM-CSPs is not more than a predefined threshold, such that a convergent key cannot be guessed by the colluded KM-CSPs.
  • 5. DISADVANTAGES OF EXISTING SYSTEM • There exists any duplication while storage into it. • Occupy a number of storage for the same amount of data.
  • 6. PROPOSED SYSTEM • In this paper, we construct a secure deduplication scheme to manage convergent keys. • In our proposed system, the file uploaded in the cloud should avoid duplicated files. • We are using convergent key encryption which completely avoids the duplicated files stored for a number of times. • Security analysis demonstrates that our scheme ensures the confidentiality of data files and the security of convergent keys.
  • 7. ADVANTAGES OF PROPOSED SYSTEM • Reduces the storage and avoid duplicate files. • Maintain single owenership for each file. • Confidentiality of files while upload and download • Reduces the storage space and exact retrieval of files.
  • 10. HARDWARE REQUIREMENTS • System : Pentium Dual Core. • Hard Disk : 120 GB. • Monitor : 15’’ LED • Input Devices : Keyboard, Mouse • Ram : 1 GB
  • 11. SOFTWARE REQUIREMENTS • Operating system : Windows 7. • Coding Language : JAVA. • Tool : Netbeans 7.2.1 • Database : MYSQL
  • 12. REFERENCE • Ling Liu, Yuqing Zhang and Xuejun Li, “KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption”, IEEE Transactions on Cloud Computing, 2019.