An implementation for secure data deduplication on end-to-end encrypted documents

被引:0
|
作者
Jipianu, Tora-Mihnea [1 ]
Aciobanitei, Iulian [1 ]
机构
[1] Mil Tech Acad Ferdinand I, Fac Informat Syst & Cyber Secur, Bucharest, Romania
关键词
Data Deduplication; Merkle Hash Tree; Merkle Tree; Proof of Ownership;
D O I
10.1109/SACI60582.2024.10619071
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the realm of data storage and management, secure data deduplication represents a cornerstone technology for optimizing storage space and reducing redundancy. Traditional client-side deduplication approaches, while efficient regarding storage and network traffic, expose vulnerabilities that allow malicious users to infer the existence of specific files through traffic analysis. Even using a Proof of ownership scheme does not guarantee protection from all attack scenarios, specific to data deduplication. This paper introduces a novel secure data deduplication framework employing a deduplication proxy that operates onpremise, effectively mitigating the risk of such inference attacks. By leveraging convergent encryption, and Merkle tree challenges for proof of ownership, our solution ensures that data deduplication does not compromise data privacy or security. The deduplication proxy acts as an intermediary, performing deduplication processes on-premise. This approach not only preserves the efficiency benefits of deduplication but also enhances security by preventing external visibility into data traffic patterns. Our implementation, publicly available on Github, demonstrates the efficacy of the method for enforcing end-to-end encryption while maintaining data deduplication's storage-saving advantages. The proposed framework is suitable for organizations aiming to safeguard their data while optimizing storage resources.
引用
收藏
页码:303 / 307
页数:5
相关论文
共 50 条
  • [31] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [32] Make It Real: An End-to-End Implementation of A Physically Disaggregated Data
    Zhang, Yiying
    OPERATING SYSTEMS REVIEW, 2023, 57 (01) : 1 - 9
  • [33] Implementation of Secure End-to-End Remote Control System for Smart Home Appliances on Android
    Tanaka, Hisayoshi
    Suzuki, Hidekazu
    Watanabe, Akira
    Naito, Katsuhiro
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [34] Universally Composable End-to-End Secure Messaging
    Canetti, Ran
    Jain, Palak
    Swanberg, Marika
    Varia, Mayank
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 3 - 33
  • [35] Secure end-to-end transport over SCTP
    Hohendorf, Carsten
    Rathgeb, Erwin P.
    Unurkhaan, Esbold
    Tuexen, Michael
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 381 - 395
  • [36] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [37] Secure End-to-End Transport Over SCTP
    Hohendorf, Carsten
    Rathgeb, Erwin P.
    Unurkhaan, Esbold
    Tuexen, Michael
    JOURNAL OF COMPUTERS, 2007, 2 (04) : 31 - 40
  • [38] A Secure End-to-End Mobile Chat Scheme
    Chen , Hsing-Chung
    Wen, Jyh-Horng
    Yang, Cheng-Ying
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 472 - 477
  • [39] An end-to-end approach to secure routing in MANETs
    Dabideen, Stephen
    Smith, Bradley R.
    Garcia-Luna-Aceves, J. J.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 130 - 149
  • [40] SMSSec: An end-to-end protocol for secure SMS
    Lo, Johnny Li-Chang
    Bishop, Judith
    Eloff, J. H. P.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 154 - 167