Abstract
Safe along with sound knowledge deduplication will noticeably cut back the communication and storage outlay in server storage space services, and has potential application in our huge data-driven society. Existing knowledge deduplication scheme area unit naturally intends to also resist brute-force attacks or confirm the strength and knowledge convenience. In the existing system, key written agreement is a drawback. In the proposed system, to get rid of key written agreement drawback, we tend to implement block style based mostly on key agreement protocol to share knowledge in CSP. It allows multiple partners to freely distribute information in cluster. The proposed system is a chunk base-type contract procedure to wire numerous partners, which might supplely expand to amount of partners inside very CSP setting as per the construction of the chunk style, and to remove knowledge redundancy drawback we tend to use knowledge deduplication system within which knowledge owner can transfer file and send to cluster manager and cluster manager checks knowledge deduplication over native domain. In this, the approved person transfers knowledge over cloud environment to transfer file, and knowledge owner can send key request to key authority for secret key. Once the key is received from key authority owner can transfer file and send to cluster manager and check file deduplication on native domain and if file isn’t offered on native domain then send file to cloud. During access, the user can send key request to any or all cluster members and after receiving the key from cluster member, file can be transferred.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Goutham, V.: Enabling server Storage Auditing with Key Exposure Resistance (2016)
Cresson, E., Chevassut, O.: Provably Authenticated Group Diffie-Hellman Key Exchange (2001)
Yu, J., Ren, K., Wang, C.: Enabling server storage auditing with verifiable outsourcing of key updates. IEEE Trans. Inf. Forensics Secur. 11(6), 11 (2016)
Guo, H., Li, Z., Mu, Y., Zhang, X.: Cryptanalysis of simple three-party key exchange protocol. Computers and Security 27(1–2), 1621 (2008)
Bresson, E., Chevassut O., Pointcheval, D.: Jean-Jacques Quisquater Provably Authenticated Group Diffie-Hellman Key Exchange
Liu, J., Pinkas, B.: Secure Deduplication of Encrypted Data Without Additional Independent Servers (2015)
Bellaire, M., Keelveedhi, S.: DupLESS: Server-Aided Encryption for Deduplicated Storage (2013)
Bashan, S.M.: Enabling Storage Auditing In server of Key Updates from Verifiable Outsource (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thakur, M.A., Bari, S., Deshmukh, R., Auty, S. (2020). Secure Key Agreement Model for Group Data Sharing and Achieving Data Deduplication in Cloud Computing. In: Tuba, M., Akashe, S., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Advances in Intelligent Systems and Computing, vol 933. Springer, Singapore. https://doi.org/10.1007/978-981-13-7166-0_12
Download citation
DOI: https://doi.org/10.1007/978-981-13-7166-0_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7165-3
Online ISBN: 978-981-13-7166-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)