Redundancy Prevention and Secure Audit of Encrypted BigData in HDFS Cloud using CloudGaurd+ System
Keywords:Redundancy Prevention, Cloud Storage, File Access Control, BigData, Data-Tag.
The recent emerging Cloud Storageand Computing Technology provides a better approach for administrations and service provisioning over the Internet byoffering various computing and storage resources. The key significant and favored cloud serviceâ€™s is information storage. Therefore, to maintain and conserve the privacy of data owners, data is often encrypted and stored onto the cloud as ciphered data. Nevertheless, a ciphered data introduces some issues for cloud data redundancy, which has been proved to be critical for Bigdata storage and computation in cloudenvironment. Conventional redundancy prevention methods do not work efficiently over ciphered data. Existing systems forciphered data redundancy prevention raises security issues and eventually effects the cloud processing. These existing systems are not capable of efficiently handling data access control and revocations. Therefore aiming to overcome these issues and achieving both redundancy prevention and integrity of cloud data, in this paper we propose a system, namely CloudGaurd+, to prevent redundancy of the stored ciphered data in HDFS Cloud based on authentication provocation and cryptography techniques. CloudGaurd+ incorporates cloud information redundancy prevention with access control. We assess its efficiency and performance based on substantial analysis and computer programming and simulations. The investigation and reenactment comes about demonstrates the unrivaled productivity and adequacy of the CloudGaurd+ system for prospective deployment practically , particularly for Bigdata redundancy prevention in HDFS distributed cloud storage can be achieved.
 Z.O. Wilcox, â€œConvergent Encryption Reconsidered,â€ 2011, http://www.mailarchive.com/ firstname.lastname@example.org /msg08949.html.
 J. Pettitt, â€œHash of Plaintext as Key?â€ http://cypherpunks.venona.com/date/ 1996/02 /msg02013.html.
 The Freenet Project. Freenet. https://freenetproject.org/.
 M. Bellare, S. Keelveedhi, and T. Ristenpart, â€œMessage-Locked Encryption and Secure Deduplication,â€ Proceedings of Cryptologyâ€“ EUROCRYPT 2013, 2013, pp. 296â€“312, doi:10.1007/978-3- 642-38348-9_18.
 D. Perttula, B. Warner, and Z. Wilcox-O'Hearn, â€œAttacks on Convergent Encryption,â€ http://bit.ly/yQxyvl.
 D.T. Meyer and W.J Bolosky, â€œA Study of Practical Deduplication,â€ ACM Transactions on Storage, 7(4), pp. 1-20, 2012, doi:10.1145/2078861.2078864.
 Opendedup. http://opendedup.org/.
 C. Liu, C. Yang, X.Y. Zhang, and J.J. Chen, â€œExternal Integrity Verification for Outsourced Big Data in Cloud and IoT: A Big Picture,â€ Future Generation Computer Systems, 2015, vol. 49, pp. 58-67.
 C.W. Tsai, C.F. Lai, H.C. Chao, and A.V. Vasilakos, â€œBig data analytics: a survey,â€ Journal of Big Data, vol. 2, no. 1, pp. 1-32, 2015, doi:10.1186/s40537-015-0030-3.
 T.T. Wu, W.C. Dou, C.H. Hu, and J.J. Chen. â€œService Mining for Trusted Service Composition in Cross-Cloud Environment,â€ IEEE Systems Journal, 2014, vol. PP, no. 99, pp. 1-12, doi:10.1109/JSYST.2014.2361841.
 L.F. Wei, H.J. Zhu, Z.F. Cao, X.L. Dong, W.W. Jia, Y.L. Chen, and A.V. Vasilakos, â€œSecurity and privacy for storage and computation in cloud computing,â€ Information Sciences, 2014, vol. 258, pp. 371-386, doi:10.1016/j.ins.2013.04.028.
 M. Ali, S.U. Khan, and A.V. Vasilakos, â€œSecurity in cloud computing: Opportunities and challenges,â€ Information Sciences, 2015, vol. 305, pp. 357-383, doi:10.1016/j.ins.2015.01.025.
 M. Ali, R. Dhamotharan, E. Khan, S.U. Khan, A.V. Vasilakos, K.Q. Li, and A.Y. Zomaya, â€œSeDaSC: secure data sharing in clouds,â€ IEEE Systems Journal, vol. PP, no. 99, pp. 1-10, 2015, doi: 10.1109/JSYST.2014.2379646.
 N.X. Xiong, A.V. Vasilakos, L.T. Yang, L.Y. Song, Y. Pan, R. Kannan, and Y.S. Li, â€œComparative Analysis of Quality of Service and Memory Usage for Adaptive Failure Detectors in Healthcare Systems,â€ IEEE Journal on Selected Areas in Communications, 2009, vol. 27, no. 4, pp. 495-509, doi:10.1109/JSAC.2009.090512.
 Y.Z. Zhou, Y.X. Zhang, H. Liu, N.X. Xiong, and A.V. Vasilakos, â€œA Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization,â€ IEEE Transactions on Services Computing, 2014, vol. 7, no. 1, pp.40-53, doi:10.1109/TSC.2012.32. 2332-7790 (c) 2016 IEEE.
 P. Meye, P. Raipin, F. Tronel, and E. Anceaume, â€œA Secure Two-Phase Data Deduplication Scheme,â€ Proceedings of HPCC/CSS/ICESS, 2014, pp. 802-809, doi:10.1109/HPCC.2014.134.
 M. Kaczmarczyk, M. Barczynski, W. Kilian, and C. Dubnicki, â€œReducing Impact of Data Fragmentation Caused by In-Line Deduplication,â€ Proceedings of the 5th Annual International Systems and Storage Conference, 2012, pp. 15:1â€“15:12, doi:10.1145/2367589.2367600.
 Dropbox, â€œA File-Storage and Sharing Service,â€ http://www.dropbox.com/.
 Google Drive, http://drive.google.com.
 Mozy, â€œMozy: A File-storage and Sharing Service,â€ http://mozy.com/.
 Z. Sun, J. Shen, and J.M. Yong, â€œDeDu: Building a Deduplication Storage System over Cloud Computing,â€ Proceedings of IEEE International Conference on Computer Supported Cooperative Work in Design, 2011, pp. 348-355, doi:10.1109/ CSCWD.2011.5960097.
 H. Shacham and B. Waters, â€œCompact proofs of retrievability,â€ in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryp-tology, ser. ASIACRYPT â€™08. Springer Berlin Heidelberg, 2008, pp. 90â€“107.
 E. Stefanov, M. van Dijk, A. Juels, and A. Oprea, â€œIris: A scalable cloud file system with efficient integrity checks,â€ inProceedings of the 28th Annual Computer Security Applications Conference, ser. ACSAC â€™12. New York, NY, USA: ACM, 2012, pp. 229â€“238.
 M. Azraoui, K. Elkhiyaoui, R. Molva, and M. Â¨ Onen, â€œStealthguard: Proofs of retrievability with hidden watchdogs,â€ inComputer Security -ESORICS 2014, ser. Lecture Notes in Computer Science, M. KutyÅ‚owski and J. Vaidya, Eds., vol. 8712. Springer International Publishing, 2014, pp. 239â€“256.
 J. Li, X. Tan, X. Chen, and D. Wong, â€œAn efficient proof of retrievability with public auditing in cloud computing,â€ in5th International Con-ference on Intelligent Networking and Collaborative Systems (INCoS), 2013, pp. 93â€“98.
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, â€œProvable data possession at untrusted stores,â€ inProceed-ings of the 14th ACM Conference on Computer and Communications Security, ser. CCS â€™07. New York, NY, USA: ACM, 2007, pp. 598â€“ 609.
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, â€œRemote data checking using provable data possession,â€ACMTrans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1â€“12:34, 2011.
 G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, â€œScalable and efficient provable data possession,â€ in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, ser. SecureComm â€™08. New York, NY, USA: ACM, 2008, pp. 9:1â€“9:10.
 C. Erway, A. KÂ¨upcÂ¸Â¨u, C. Papamanthou, and R. Tamassia, â€œDynamic provable data possession,â€ inProceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS â€™09. New York, NY, USA: ACM, 2009, pp. 213â€“222.
 F. SebÂ´e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, â€œEfficient remote data possession checking in critical information infrastructures,â€ IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 8, pp. 1034â€“1038, 2008.
 Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, â€œCooperative provable data possession for integrity verification in multicloudstorage,â€IEEE Trans-actions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231â€“ 2244, 2012.
 H. Wang, â€œProxy provable data possession in public clouds,â€ IEEE Transactions on Services Computing, vol. 6, no. 4, pp. 551â€“559, 2013.
 S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, â€œProofs of ownership in remote storage systems,â€ inProceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, pp. 491â€“500.
 W. K. Ng, Y. Wen, and H. Zhu, â€œPrivate data deduplication protocols in cloud storage,â€ in Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC â€™12. New York, NY, USA: ACM, 2012, pp. 441â€“446.
 J. Douceur, A. Adya, W. Bolosky, P. Simon, and M. Theimer, â€œReclaim-ing space from duplicate files in a serverless distributed file system,â€ in 22nd International Conference on Distributed Computing Systems, 2002, pp. 617â€“624.
 M. Bellare, S. Keelveedhi, and T. Ristenpart, â€œMessage-locked encryp-tion and secure deduplication,â€ in Advances in Cryptology â€“ EURO-CRYPT 2013, ser. Lecture Notes in Computer Science, T. Johansson and P. Nguyen, Eds. Springer Berlin Heidelberg, 2013, vol. 7881, pp. 296â€“312.
 M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, â€œMessage-locked encryption for lock-dependent messages,â€ inAdvances in Cryptology â€“ CRYPTO 2013, ser. Lecture Notes in Computer Science, R. Canetti and J. Garay, Eds. Springer Berlin Heidelberg, 2013, vol. 8042, pp. 374â€“391.
 S. Keelveedhi, M. Bellare, and T. Ristenpart, â€œDupless: Server-aided encryption for deduplicated storage,â€ in Proceedings of the 22Nd USENIX Conference on Security, ser. SECâ€™13. Washington, D.C.: USENIX Association, 2013, pp. 179â€“194. [Online]. Avail-able:https://www.usenix.org/conference/usenixsecurity13/technical-essions/presentation/bellare.
 J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, â€œSecure deduplication with efficient and reliable convergent key management,â€ IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615â€“1625, June 2014.
 J. Yuan and S. Yu, â€œSecure and constant cost public cloud storage auditing with deduplication,â€ in IEEE Conference on Communications and Network Security (CNS), 2013, pp. 145â€“153.
 Jingwei Li, Jin Li, DongqingXie, and Zhang Cai â€œSecure Auditing and Deduplicating Data in Cloudâ€ IEEE TRANSACTIONS ON COMPUTERS, VOL. 65, NO. 8, AUGUST 2016.
 Zheng Yan, Senior Member, IEEE, Wenxiu Ding, Xixun Yu, Haiqi Zhu, and Robert H. Deng,Fellow, IEEE â€œDeduplication on Encrypted Big Data in Cloudâ€ IEEE TRANSACTIONS ON JOURNAL NAME, MANUSCRIPT ID.
 William Stallings â€œCryptography and Network Security: Principles and Practice, Sixth Editionâ€ ISBN 10: 0-13-335469-5, ISBN 13: 978-0-13-335469-0.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).