SlideShare a Scribd company logo
KeyD: Secure Key-Deduplication with Identity-Based
Broadcast Encryption
ABSTRACT:
Deduplication, which can save storage cost by enabling us to store only one copy
of identical data, becomes unprecedentedly significant with the dramatic increase
in data stored in the cloud. For the purpose of ensuring data confidentiality, they
are usually encrypted before outsourced. Traditional encryption will inevitably
result in multiple different ciphertexts produced from the same plaintext by
different users’ secret keys, which hinders data deduplication. Convergent
encryption makes deduplication possible since it naturally encrypts the same
plaintexts into the same ciphertexts. One attendant problem is how to reliably and
effectively manage a huge number of convergent keys. Several deduplication
schemes have been proposed to deal with the convergent key management
problem. However, they either need to introduce key management servers or
require interaction between data owners. In this paper, we design a novel client-
side deduplication protocol named KeyD without such an independent key
management server by utilizing the identity-based broadcast encryption (IBBE)
technique. Users only interact with the cloud service provider (CSP) during the
process of data upload and download. Security analysis demonstrates that KeyD
ensures data confidentiality and convergent key security, and well protects the
ownership privacy simultaneously. A thorough and detailed performance
comparison shows that our scheme makes a better tradeoff among the storage cost,
communication and computation overhead.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA.
 Tool : Netbeans 7.2.1
 Database : MYSQL
REFERENCE:
Ling Liu, Yuqing Zhang and Xuejun Li, “KeyD: Secure Key-Deduplication with
Identity-Based Broadcast Encryption”, IEEE Transactions on Cloud Computing,
2019.

More Related Content

PDF
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
PDF
[한국핀테크포럼] 제7회 핀테크포럼
PPTX
Blockchains and the IoT
PPTX
The Cloud is dead ?! Blockchain in the new cloud
PDF
LWT Introduction to Blockchain Technologies
PDF
The KeeeX Messenger teaser 2016-05-19-lh-xofad-bosop
PPTX
blockchain is the new cloud
PDF
Distributed:Health Code Camp Hyperledger
150625_핀테크포럼 6월 정기모임_빅데이터시대와 블록체인
[한국핀테크포럼] 제7회 핀테크포럼
Blockchains and the IoT
The Cloud is dead ?! Blockchain in the new cloud
LWT Introduction to Blockchain Technologies
The KeeeX Messenger teaser 2016-05-19-lh-xofad-bosop
blockchain is the new cloud
Distributed:Health Code Camp Hyperledger

What's hot (20)

PDF
Hyperledger arch wg_paper_1_consensus
DOCX
Hyper ledger febric
PDF
blockchain unit 3
PDF
Keeex - On data governance - xofos-bafek-zebug
PPTX
Blockchain Introduction
PDF
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
PDF
Role of hyperledger fabric in blockchain
PDF
Distributed Ledger Technology
PDF
Security in the blockchain
PDF
Blockchin architecture & use cases -part-2
PDF
Build Blockchain Prototype using Azure Workbench and Manage data on ledger
PPTX
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
PPTX
Meetup AZUG FR Oct 2017 @ Cellenza
PPTX
Applying blockchain technology to decentralized operation in future
PPTX
Security best practices for hyperledger fabric
PDF
BigchainDB - Big Data meets Blockchain
PPTX
DevSecOps: Security With DevOps
PDF
Distributed:Health Code Camp Instructions
PDF
Presented AITC Blockchain Framework @ NPC 17
PPT
Hyperledger arch wg_paper_1_consensus
Hyper ledger febric
blockchain unit 3
Keeex - On data governance - xofos-bafek-zebug
Blockchain Introduction
The KeeeX teaser 2015-12-23-lh-xovoz-tonos
Role of hyperledger fabric in blockchain
Distributed Ledger Technology
Security in the blockchain
Blockchin architecture & use cases -part-2
Build Blockchain Prototype using Azure Workbench and Manage data on ledger
Сloud Webinar #1 “Architecture of Highly Loaded Geo-Distributed Applications”
Meetup AZUG FR Oct 2017 @ Cellenza
Applying blockchain technology to decentralized operation in future
Security best practices for hyperledger fabric
BigchainDB - Big Data meets Blockchain
DevSecOps: Security With DevOps
Distributed:Health Code Camp Instructions
Presented AITC Blockchain Framework @ NPC 17
Ad

Similar to KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption (20)

PPTX
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
PDF
IJSRED-V2I2P10
DOCX
Identity based secure distributed data storage
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
DOCX
Identity based secure distributed data storage schemes
DOC
A securing symmetric key distribution
PDF
Improving Data Storage Security in Cloud using Hadoop
PPTX
Identity Based Secure Distributed Storage Scheme
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
PDF
Iaetsd a survey on cloud storage security with
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
PDF
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
PDF
Providing Secure Cloud for College Campus
PDF
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
IJSRED-V2I2P10
Identity based secure distributed data storage
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
Identity based secure distributed data storage schemes
A securing symmetric key distribution
Improving Data Storage Security in Cloud using Hadoop
Identity Based Secure Distributed Storage Scheme
Key aggregate cryptosystem for scalable data sharing in cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Iaetsd a survey on cloud storage security with
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Providing Secure Cloud for College Campus
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
PDF
Dot Net Final Year IEEE Project Titles.pdf
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
PDF
Python IEEE Project Titles 2023 - 2024.pdf
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
DOCX
Spammer detection and fake user Identification on Social Networks
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
Java Web Application Project Titles 2023-2024.pdf
Dot Net Final Year IEEE Project Titles.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Spammer detection and fake user Identification on Social Networks
Sentiment Classification using N-gram IDF and Automated Machine Learning
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Crop Yield Prediction and Efficient use of Fertilizers
Collaborative Filtering-based Electricity Plan Recommender System
Achieving Data Truthfulness and Privacy Preservation in Data Markets
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
Towards Fast and Reliable Multi-hop Routing in VANETs
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Node-Level Trust Evaluation in Wireless Sensor Networks

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Basic Mud Logging Guide for educational purpose
PDF
Insiders guide to clinical Medicine.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Structure & Organelles in detailed.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
PPH.pptx obstetrics and gynecology in nursing
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
Microbial disease of the cardiovascular and lymphatic systems
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Pharma ospi slides which help in ospi learning
Basic Mud Logging Guide for educational purpose
Insiders guide to clinical Medicine.pdf
O7-L3 Supply Chain Operations - ICLT Program
Cell Structure & Organelles in detailed.

KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption

  • 1. KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption ABSTRACT: Deduplication, which can save storage cost by enabling us to store only one copy of identical data, becomes unprecedentedly significant with the dramatic increase in data stored in the cloud. For the purpose of ensuring data confidentiality, they are usually encrypted before outsourced. Traditional encryption will inevitably result in multiple different ciphertexts produced from the same plaintext by different users’ secret keys, which hinders data deduplication. Convergent encryption makes deduplication possible since it naturally encrypts the same plaintexts into the same ciphertexts. One attendant problem is how to reliably and effectively manage a huge number of convergent keys. Several deduplication schemes have been proposed to deal with the convergent key management problem. However, they either need to introduce key management servers or require interaction between data owners. In this paper, we design a novel client- side deduplication protocol named KeyD without such an independent key management server by utilizing the identity-based broadcast encryption (IBBE) technique. Users only interact with the cloud service provider (CSP) during the process of data upload and download. Security analysis demonstrates that KeyD ensures data confidentiality and convergent key security, and well protects the ownership privacy simultaneously. A thorough and detailed performance comparison shows that our scheme makes a better tradeoff among the storage cost, communication and computation overhead.
  • 2. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA.  Tool : Netbeans 7.2.1  Database : MYSQL REFERENCE: Ling Liu, Yuqing Zhang and Xuejun Li, “KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption”, IEEE Transactions on Cloud Computing, 2019.