AF-Dedup: Secure Encrypted Data Deduplication Based on Adaptive Dynamic Merkle Hash Forest PoW for Cloud Storage

被引:0
|
作者
Guo, Xinyue [1 ]
Xian, Hequn [1 ,2 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266000, Peoples R China
[2] Cryptog & Cyberspace Secur Whampoa Inst, Guangzhou 510000, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Encryption; Servers; Cloud computing; Forestry; Informatics; Dictionaries; Adaptive dynamic Merkle hash forest (ADMHF); bilinear mapping; encrypted data deduplication (AF-Dedup); proof of ownership (PoW); SCHEME; KEY;
D O I
10.1109/TII.2024.3417327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For encrypted data deduplication, proof of ownership (PoW) verifies a client's ownership of an entire file, preventing malicious users from exploiting a single segment of information to gain access to the file. By establishing the identity of two users who possess the same file, cloud service provider (CSP) can maintain a single copy for the file, enabling deduplication. However, existing PoW schemes based on Merkle hash tree (MHT) cannot guarantee the security of small files. Therefore, we propose a novel data structure named adaptive dynamic Merkle hash forest (ADMHF) for PoW, and present an encrypted data deduplication scheme called AF-Dedup. It reduces the risks of data content exposure resulting from multiple ownership verification attempts in traditional schemes. Specifically, we first construct the file tag as a unique identifier of the file. Second, different encryption schemes are employed depending on the popularity of the data. Then, the corresponding ADMHF is generated for subsequent ownership verifications. After security analysis and simulation experiments, our scheme is proven to significantly enhance the security of small files. In a given situation for files with only two blocks, our scheme achieves the same level of security as the existing scheme for a file with 91 blocks.
引用
收藏
页码:12294 / 12304
页数:11
相关论文
共 42 条
  • [1] Merkle Hash Tree based Deduplication in Cloud Storage
    Li, Chaoling
    Chen, Yue
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
  • [2] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [3] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    [J]. FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235
  • [4] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [5] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [6] Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers
    Zhang, Yuan
    Xu, Chunxiang
    Cheng, Nan
    Shen, Xuemin
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [7] Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
    Hur, Junbeom
    Koo, Dongyoung
    Shin, Youngjoo
    Kang, Kyungtae
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 3113 - 3125
  • [8] Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain
    He, Kai
    Huang, Chunxiao
    Shi, Jiaoli
    Hu, Xinrong
    Fan, Xiying
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [9] Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage
    Qi, Saiyu
    Wei, Wei
    Wang, Jianfeng
    Sun, Shifeng
    Rutkowski, Leszek
    Huang, Tingwen
    Kacprzyk, Janusz
    Qi, Yong
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2566 - 2582
  • [10] Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
    Sun, Wenhai
    Zhang, Ning
    Lou, Wenjing
    Hou, Y. Thomas
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,