Skip to main content

Secure Key Agreement Model for Group Data Sharing and Achieving Data Deduplication in Cloud Computing

  • Conference paper
  • First Online:
Information and Communication Technology for Sustainable Development

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 933))

Abstract

Safe along with sound knowledge deduplication will noticeably cut back the communication and storage outlay in server storage space services, and has potential application in our huge data-driven society. Existing knowledge deduplication scheme area unit naturally intends to also resist brute-force attacks or confirm the strength and knowledge convenience. In the existing system, key written agreement is a drawback. In the proposed system, to get rid of key written agreement drawback, we tend to implement block style based mostly on key agreement protocol to share knowledge in CSP. It allows multiple partners to freely distribute information in cluster. The proposed system is a chunk base-type contract procedure to wire numerous partners, which might supplely expand to amount of partners inside very CSP setting as per the construction of the chunk style, and to remove knowledge redundancy drawback we tend to use knowledge deduplication system within which knowledge owner can transfer file and send to cluster manager and cluster manager checks knowledge deduplication over native domain. In this, the approved person transfers knowledge over cloud environment to transfer file, and knowledge owner can send key request to key authority for secret key. Once the key is received from key authority owner can transfer file and send to cluster manager and check file deduplication on native domain and if file isn’t offered on native domain then send file to cloud. During access, the user can send key request to any or all cluster members and after receiving the key from cluster member, file can be transferred.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Goutham, V.: Enabling server Storage Auditing with Key Exposure Resistance (2016)

    Google Scholar 

  2. Cresson, E., Chevassut, O.: Provably Authenticated Group Diffie-Hellman Key Exchange (2001)

    Google Scholar 

  3. Yu, J., Ren, K., Wang, C.: Enabling server storage auditing with verifiable outsourcing of key updates. IEEE Trans. Inf. Forensics Secur. 11(6), 11 (2016)

    Article  Google Scholar 

  4. Guo, H., Li, Z., Mu, Y., Zhang, X.: Cryptanalysis of simple three-party key exchange protocol. Computers and Security 27(1–2), 1621 (2008)

    Google Scholar 

  5. Bresson, E., Chevassut O., Pointcheval, D.: Jean-Jacques Quisquater Provably Authenticated Group Diffie-Hellman Key Exchange

    Google Scholar 

  6. Liu, J., Pinkas, B.: Secure Deduplication of Encrypted Data Without Additional Independent Servers (2015)

    Google Scholar 

  7. Bellaire, M., Keelveedhi, S.: DupLESS: Server-Aided Encryption for Deduplicated Storage (2013)

    Google Scholar 

  8. Bashan, S.M.: Enabling Storage Auditing In server of Key Updates from Verifiable Outsource (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manav Ashok Thakur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thakur, M.A., Bari, S., Deshmukh, R., Auty, S. (2020). Secure Key Agreement Model for Group Data Sharing and Achieving Data Deduplication in Cloud Computing. In: Tuba, M., Akashe, S., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Advances in Intelligent Systems and Computing, vol 933. Springer, Singapore. https://doi.org/10.1007/978-981-13-7166-0_12

Download citation

Publish with us

Policies and ethics