A Methodology of Securely Backing up Cloud Information by MFA and De-duplicating Encrypted Information

Authors

  • Naga Chandrika H. Department of Computer Science and Engineering, Research Scholar, Dr. A. P. J. Abdul Kalam University, Indore
  • Pramod Pandurang Jadhav Department of Computer Science and Engineering, Research Supervisor, Dr. A. P. J. Abdul Kalam University, Indore

Keywords:

Cloud Information, Securedly Backing, Deduplicating Encrypted Information, Trustworthiness, Randomized

Abstract

In the context of mobile devices or laptops, the potential loss, theft, misplacement, or corruption of sensitive information is a concern. To mitigate these risks, a technique involving remote backup memories is employed; nonetheless, complete trustworthiness cannot be attributed to the backup server, necessitating the prior encryption of the information. While the key benefits from enhanced protection owing to its reduced size in comparison to the backup information, its memorization remains an insurmountable task for the average individual. In this endeavour, the problem of formulating a secure deduplication scheme based on portions is explored within the context of enterprise backup memories. A user-centric design for an information backup scheme is put forth, incorporating multifactor authentication. Initially, an encipherment is chosen by the user, divided into three shares, and subsequently rendered irretrievable. Specifically, it is discerned that the susceptibility of the information within a diminutive portion to brute-force attacks surpasses that of the file-based deduplicating procedure. A randomized oblivious encipherment generating mechanism is suggested, rooted in the internal operations of the memories service. The reconstruction of the encipherment is effortlessly achievable through the amalgamation of shares preserved insideinto utilizer's smartcards and desktop. Stipulated scheme not only attains the necessary security objectives but also demonstrates heightened resilience and practicality.

Downloads

Download data is not yet available.

References

Wei, L., Zhu, H., Cao, Z., et al.: ‘Security and privacy for storage and computation in cloud computing’, Inf. Sci., 2014, 258, (3), pp. 371–386.

Weinman, J.: ‘The future of cloud computing’, Expert Group Report European Commission, 2010, 3, (1), pp. 47–68.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system”, in Proc. of IEEE ICDCS, pp. 617–624, 2002.

Katz, J., Lindell, Y.: ‘Introduction to modern cryptography’ (CRC Press, 2007).

P. Puzio, R. Molva, M. Onen, and S. Loureiro, “ClouDedup: Secure deduplication with encrypted data for cloud storage”, in Proc. of IEEE CloudCom, pp. 363–370, 2013.

J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, “A secure data deduplication scheme for cloud storage”, in Financial Cryptography and Data Security, pp. 99–118, 2014.

M. Bellare, S. Keelveedhi, and T. Ristenpart, “DupLESS: Server-aided encryption for deduplicated storage”, in Proc. of USENIX Security, pp.179–194, 2013.

Y. Duan, “Distributed key generation for encrypted deduplication:Achieving the strongest privacy”, in Proc. of ACM CCSW, pp 57–68, 2014.

J. Liu, N. Asokan, and B. Pinkas, “Secure deduplication of encrypted data without additional independent servers”, in Proc. of ACM CCS, pp. 874–885, 2015.

Das, A.K.: ‘Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards’, Inf. Sec., 2011, 5, (3), pp. 145–151.

Chang, C., Chou, Y., Sun, C.: ‘Novel and practical scheme based on secret sharing for laptop data protection’, Inf. Sec., 2015, 9, (2), pp. 100–107

Shamir, A.: ‘How to share a secret’, ACM Commun., 1979, 22, (11), pp. 612– 613

Tian, Y., Ma, J., Peng, C., et al.: ‘Fair (t, n) threshold secret sharing scheme’, Inf. Sec., 2013, 7, (2), pp. 106–112

Harn, L.: ‘Comments on ‘fair (t, n) threshold secret sharing scheme’’, Inf. Sec., 2014, 8, (6), pp. 303–304.

D. T. Meyer and W. J. Bolosky, “A study of practical deduplication”, ACM TOS, vol. 7, no. 4, p. 14, 2012.

J. Paulo and J. Pereira, “A survey and classification of storage deduplication systems”, ACM CSUR, vol. 47, no. 1, p. 11, 2014.

Huang, X., Xiang, Y., Chonka, A., et al.: ‘A generic framework for three factor authentication: preserving security and privacy in distributed systems’, Trans. Parallel Distrib. Syst., 2011, 22, (8), pp. 1390–1397.

Lin, C., Lai, Y.: ‘A flexible biometric remote user authentication scheme’, Comp. Stand. Interf., 2004, 27, (1), pp. 19–23

Khan, M.K., Zhang, J., Wang, X.: ‘Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices’, Chaos Soliton Fract., 2008, 35, (3), pp. 519–524.

Li, C., Hwang, M.: ‘An efficient biometric-based remote authentication scheme using smart cards’, J. Netw. Comput. Appl., 2010, 33, (1), pp. 1–5

An, Y.: ‘Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards’, Biomed. Res. Int., 2011, 2012, (4), pp. 213–219.

Khan, M., Kumari, S.: ‘An improved biometrics-based remote user authentication scheme with user anonymity’, Biomed. Res. Int., 2013, 2013,(10), pp. 1010–1014.

Chaturvedi, A., Mishra, D., Mukhopadhyay, S.: ‘Improved biometric-based three-factor remote user authentication scheme with key agreement using smart card’. ICISS, 2013, Proc. of the 9th Int. Conf. on Information Systems Security (LNCS, 8303), pp. 63–77.

Li, X., Niu, J., Khan, M.K., et al.: ‘Robust biometrics based three-factor remote user authentication scheme with key agreement’. Biometrics and Security Technologies (ISBAST), 2013 Int. Symp. on. IEEE, 2013, pp. 105– 110.

Mathew, H.M., Raj, S.B.E., Gundapu, P.S.J., et al.: ‘An improved three-factor authentication scheme using smart card with biometric privacy protection’. Electronics Computer Technology (ICECT), 2011 3rd Int. Conf. on. IEEE, 2011, pp. 220–223.

Sarvabhatla, M., Giri, M., Vorugunti, C.S.: ‘A secure biometrics-based remote user authentication scheme for secure data exchange’. Embedded Systems (ICES), 2014 Int. Conf. on. IEEE, 2014, pp. 110–115.

Akbar, Mohd, Irshad Ahmad, Mohsina Mirza, Manavver Ali, and Praveen Barmavatu. "Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach." *Cluster Computing*, 2023, pp. 1-20.

Wang, Min, Lujun Xu, Rong Hao, and Ming Yang. "Secure auditing and deduplication with efficient ownership management for cloud storage." *Journal of Systems Architecture*, vol. 142, 2023, p. 102953.

M. Song, Z. Hua, Y. Zheng, H. Huang and X. Jia, "LSDedup: Layered Secure Deduplication for Cloud Storage," in IEEE Transactions on Computers, vol. 73, no. 2, pp. 422-435, Feb. 2024, doi: 10.1109/TC.2023.3331953.

B. Rasina Begum and P. Chitra, "SEEDDUP: a three-tier SEcurE data DedUPlication architecture-based storage and retrieval for cross-domains over cloud," *IETE Journal of Research*, vol. 69, no. 4, pp. 2224-2241, 2023.

S. Qi et al., "Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage," in IEEE Transactions on Mobile Computing, doi: 10.1109/TMC.2023.3263901.

S. Qi, W. Wei, J. Wang, S. Sun, L. Rutkowski, T. Huang, J. Kacprzyk, and Y. Qi, "Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage," IEEE Transactions on Mobile Computing, 2023.

G. Cheng, L. Luo, J. Xia, D. Guo and Y. Sun, "When Deduplication Meets Migration: An Efficient and Adaptive Strategy in Distributed Storage Systems," in IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 10, pp. 2749-2766, Oct. 2023, doi: 10.1109/TPDS.2023.3299309.

Downloads

Published

24.03.2024

How to Cite

Chandrika H., N. ., & Jadhav, P. P. . (2024). A Methodology of Securely Backing up Cloud Information by MFA and De-duplicating Encrypted Information. International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 201–209. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5059

Issue

Section

Research Article