Search WWW Search
»Journal Description
»Call for Papers and Reviewers
»Author Guidelines
»Contents & Papers
»Call for Special Issues

Reliable and Efficient Distribution of Multicast Session Key for Deduplicated Data in Cloud Computing


Parth Shah1*,Amit Ganatra1


1Charotar University of Science and Technology, Changa, India


Data deduplication is one of the fascinating features of any cloud computing storage service which is generally realized as Cross User Data Deduplication (CUDD). Although it provides optimization which is challenging to achieve due to security concerns. A User always concerns about privacy and confidentiality of the data from honest but curious insiders. Encryption introduces new challenge like key distribution among the group of clients who share the same file and also raises constraints of forward and backward secrecy of the data when any user upload or delete the data. Efficient and secure key distribution along with data integrity verification are the biggest challenges in CUDD. In this work, we have proposed the solution of efficient key management in CUDD along with the data integrity verification. We have provided the solution multicast key distribution using error correcting codes that maintain users' access rights, which is more efficient and reliable.


Data deduplication, Rekeying, MDS code, Data integrity, (K, Ѳ) uncheatability, Server unforgeability.

Full Text:

  1. Q. Zheng and S. Xu, "Secure and efficient proof of storage with deduplication", CODASPY’12: ACM conference on Data and Application Security and Privacy, pp. 1-12. 2012.
  2. Y. J. Shin, J. Hur, K. Kim, "Security weakness in the Proof of Storage with Deduplication", IACR Cryptology ePrint Archive, pp. 1-11. 2012.
  3. Y. Zha, S. Luo, J. Bian and W. Li, "A novel provable data possession scheme based on geographic location attribute," in China Communications, vol. 13, no. 9, pp. 139-150, Sept. 2016.
  4. Y. Yu, J. Ni, W. Wu and Y. Wang, "Provable Data Possession Supporting Secure Data Transfer for Cloud Storage," 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), Krakow, 2015, pp. 38-42.
  5. X. Yu and Q. Wen, "MF-PDP: Multi-function provable data possession scheme in cloud computing," 2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, Shenzhen, 2014, pp. 597-603. doi: 10.1109/CCIS.2014.7175805
  6. J. Xu, Ee-Chien Chang, and J. Zhou, "Weak leakage-resilient client-side deduplication of encrypted data in cloud storage", In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 195-206, ACM, May 2013.
  7. L. Xu and C. Huang, "Computation-Efficient Multicast Key Distribution," in IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 5, pp. 577-587, May 2008.
  8. D. R. Stinson, “On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption”, Designs, Codes and Cryptography, vol. 12, pp. 215-243, 1997.
  9. D. R. Stinson and T. van Trung, “Some New Results on Key Distribution Patterns and Broadcast Encryption”, Designs, Codes and Cryptography, vol. 14, pp. 261-279, 1998.
  10. M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, “The VersaKey Framework: Versatile Group Key Management,” IEEE J. Selected Areas in Comm., vol. 7, no. 8, pp. 1614-1631, Aug. 1999.
  11. S. Mittra, “Iolus: A Framework for Scalable Secure Multicasting”, Proc. ACM SIGCOMM ’97, pp. 277-288, Sept. 1997.
  12. D. M. Wallner, E.J. Harder, and R.C. Agee, “Key Management for Multicast: Issues and Architectures”, IETF Internet draft, Sept. 1998.
  13. C. K. Wong, M. Gouda, and S.S. Lam, “Secure Group Communications Using Key Graphs,” Proc. ACM SIGCOMM ’98, Sept. 1998.
  14. M. W. Storer, K. Greenan, Darrell D.E. Long, and Ethan L. Miller, "Secure data deduplication", In Proceedings of the 4th ACM international workshop on Storage, pp. 1–10, 2008.
  15. D. Harnik, B. Pinkas, A. Shulman-Peleg, "Side channels in cloud services: Deduplication in cloud storage. Security & Privacy", IEEE 8(6), pp. 40–47, 2010.
  16. H. S., Harnik D., B. Pinkas, Shulman-Peleg A., "Proofs of ownership in remote storage systems", In Proceedings of the 18th ACM conference on Computer and communications security, pp. 491-500, Oct 2011.
  17. M. Bellare, S. Keelveedhi, T. Ristenpart, "DupLESS: Server-Aided Encryption for Deduplicated Storage", In Proceedings of the 22nd USENIX Security Symposium, pp. 179-194, USENIX August 2013
  18. F. J. MacWilliams and N. J. A. Sloane, “The theory of error-correcting codes”. I and II. Bull. Amer. Math. Soc. 84, no. 6, pp. 1356—1359, 1978.
  19. J. S. Plank, “A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-Like Systems,” Software: Practice and Experience, vol. 27, no. 9, pp. 995-1012, Jan. 1999.
  20. J. S. Plank and L. Xu, "Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications," Fifth IEEE International Symposium on Network Computing and Applications (NCA'06), Cambridge, MA, pp. 173-180, 2006.
  21. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores”. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 598-609, 2007.

INASS Home | Copyright@2008 The Intelligent Networks and Systems Society