An implementation for secure data deduplication on end-to-end encrypted documents

被引:0
|
作者
Jipianu, Tora-Mihnea [1 ]
Aciobanitei, Iulian [1 ]
机构
[1] Mil Tech Acad Ferdinand I, Fac Informat Syst & Cyber Secur, Bucharest, Romania
关键词
Data Deduplication; Merkle Hash Tree; Merkle Tree; Proof of Ownership;
D O I
10.1109/SACI60582.2024.10619071
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the realm of data storage and management, secure data deduplication represents a cornerstone technology for optimizing storage space and reducing redundancy. Traditional client-side deduplication approaches, while efficient regarding storage and network traffic, expose vulnerabilities that allow malicious users to infer the existence of specific files through traffic analysis. Even using a Proof of ownership scheme does not guarantee protection from all attack scenarios, specific to data deduplication. This paper introduces a novel secure data deduplication framework employing a deduplication proxy that operates onpremise, effectively mitigating the risk of such inference attacks. By leveraging convergent encryption, and Merkle tree challenges for proof of ownership, our solution ensures that data deduplication does not compromise data privacy or security. The deduplication proxy acts as an intermediary, performing deduplication processes on-premise. This approach not only preserves the efficiency benefits of deduplication but also enhances security by preventing external visibility into data traffic patterns. Our implementation, publicly available on Github, demonstrates the efficacy of the method for enforcing end-to-end encryption while maintaining data deduplication's storage-saving advantages. The proposed framework is suitable for organizations aiming to safeguard their data while optimizing storage resources.
引用
收藏
页码:303 / 307
页数:5
相关论文
共 50 条
  • [41] SECURE END-TO-END DELEGATIONS IN DISTRIBUTED SYSTEMS
    HARDJONO, T
    OHTA, T
    COMPUTER COMMUNICATIONS, 1994, 17 (03) : 230 - 238
  • [42] Secure End-to-End Sensing in Supply Chains
    Pennekamp, Jan
    Alder, Fritz
    Matzutt, Roman
    Muehlberg, Jan Tobias
    Piessens, Frank
    Wehrle, Klaus
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [43] Secure Encoded Instruction Graphs for End-to-End Data Validation in Autonomous Robots
    Queralta, Jorge Pena
    Li, Qingqing
    Ferrer, Eduardo Castello
    Westerlund, Tomi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 18028 - 18040
  • [44] Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks
    Poornima, A. S.
    Amberker, B. B.
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 193 - 219
  • [45] End-to-end encrypted communication security technology for mobile terminals
    Zhang, Xiaozhi
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 179 - 195
  • [46] Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
    Davies, Gareth T.
    Faller, Sebastian
    Gellert, Kai
    Handirk, Tobias
    Hesse, Julia
    Horvath, Mate
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT IV, 2023, 14084 : 330 - 361
  • [47] Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs
    Alghamdi, Wael Y.
    Wu, Hui
    Kanhere, Salil S.
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [48] An End to End Secure CBIR over Encrypted Medical Database
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    2016 38TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2016, : 2537 - 2540
  • [49] Implementation of End-to-end connection of SAN
    Zhang Xin-Ying
    Tu Xiao-Dong
    2010 INTERNATIONAL CONFERENCE ON THE DEVELOPMENT OF EDUCATIONAL SCIENCE AND COMPUTER TECHNOLOGY, 2010, : 185 - 187
  • [50] SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating
    Zhang, Shuguang
    Xian, Hequn
    Li, Zengpeng
    Wang, Liming
    IEEE ACCESS, 2020, 8 : 186323 - 186334