Secure Authorized De-duplication with Hybrid Cloud Approach
With the continuous and exponential growth in users and increase in their data size, data de-duplication becomes more and more necessity for cloud storage providers. Data de-duplication is important data compression technique which eliminates duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. De-duplication can be performed on file level as well as block level. We are considering these both approaches. Convergent encryption has been introduced to maintain security while supporting de-duplication. To enhance data security and achieve confidentiality this paper formally addresses the problem of authorized data de-duplication. Duplicate check is based on differential privileges of users. Duplicate check is carried on data itself. To retain the privacy of sensitive data concept of hybrid cloud is proposed. Several new de-duplication constructions supporting authorized duplicate check in hybrid cloud architecture are proposed. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct tested experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Jin Li and Yan Kit Li A˙ Hybrid cloud approach for secure authorized de-duplication, IEEE Transaction on parallel and distributed system,vol:pp:99 2014.
J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou. Secure de-duplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013.
M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Server aided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296 312, 2013.
J. Xu, E.-C. Chang, and J. Zhou, Weak leakage-resilient client- side deduplication of encrypted data in cloud storage, In ASIACCS, pages 195-206, 2013.
W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In S Ossowski and P. 2012.
S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 491500. ACM, 2011.
M Bellare, C. Namprempre, and G Neven Security proofs for identity- based identification and signature schemes.J Crypoiogy. 18th ACM conference on Computer and communications security, CCS11, page 515526, New York, NY, USA, 2011. ACM.
M. Bellare, C. Namprempre , and G. Neven. Security proofs for identity- based identification and signature schemes. J. Cryptology, 2009.
J. Yuan and S. Yu., Secure and constant cost public cloud storage auditing with de-duplication, IACR Cryptology ePrint Archive, 2013:149, 2013.
J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, A secure data de-duplication scheme for cloud storage, In Technical Report 2013.
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M.Theimer, Reclaiming space from duplicate files in a serverless distributed file system, In ICDCS, Harlow, pages 617-624, 2002.
P. Anderson and L. Zhang, Fast and secure laptop backups with encrypted de-duplication, In Proc. of USENIX LISA, 2010.
A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, A Secure cloud backup system with assured deletion and version control, In 3rd International Workshop on Security in Cloud Computing, 2011.
M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, Secure data de-duplication, In Proc. of StorageSS, 2008.
Z. Wilcox-OHearn and B. Warner., Tahoe: the least- authority file system, In Proc. of ACM StorageSS. 2008.
Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, Sedic: privacy aware data intensive computing on hybrid clouds, In Proceedings of the 18th ACM conference on Computer and communications security, CCS11, pages 515-526, New York, NY, USA, 2011. ACM.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.