Loading

IBADedup – Image Based Authentication and Deduplication Scheme in Cloud user Group
T. A. Mohanaprakash1, J.Andrews2
1T.A.Mohanaprakash, Research Scholar, Department of CSE, Sathyabama Institute of Science and Technology, Chennai, Tamilnadu, India.
2Dr.J.Andrews, Associate Professor, Department of CSE, Presidency University, Rajanakunte, Yelahanka, Bengaluru, Karnataka, India.

Manuscript received on November 17., 2019. | Revised Manuscript received on November 24 2019. | Manuscript published on 30 November, 2019. | PP: 12233-12244 | Volume-8 Issue-4, November 2019. | Retrieval Number: D8965118419/2019©BEIESP | DOI: 10.35940/ijrte.D8965.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In recent times the cloud storage services are widely used for storage and processing. This has made the increasing demand for the mechanism or methodology which will provide the solution for reducing the use of redundant data, to achieve better space and bandwidth requirements of a storage service. Cloud computing enables all the remote workstations are light weighted where the operating system, services and user data are centralized in cloud servers and are shared by other users of the cloud. This sort of data sharing causes collusion attacks on an unsecure environment. Thus a secure protection scheme is needed to encrypt the private information. This may prove to be a problem because the distribution and storage of a key is difficult in a cloud with dynamic users. The proposed system provides distribution of key without the need for a secure communication channel using a group manager. This system also performs data De-duplication and prevents unauthorized access to a file using graphical passwords. Here the user selects an image to authenticate his identity. This image is split into 16 parts by the administrator; these 16 parts are generated randomly using a pseudo random generator technique. Then, the administrator holds onto 4 parts of the entire image to authenticate the user at time of login using Attribute Based Encryption. This helps the administrator authenticate the user and also prevents a revoked user from gaining access to a file. The Group Manager ensures the privacy of the files shared within a group by updating the user information to the database and by using RC6block cipher technique to encrypt the documents at time of storage. Thus when the user needs to download a file from a group a request is sent to the group manager and the decrypted file is then downloaded.
Keywords: Data Deduplication, Image Based Authentication, Key distribution, Privacy-preserving.
Scope of the Article: Security, Trust and Privacy.