SecDedup: Secure data deduplication with dynamic auditing in the cloud

被引:7
|
作者
Peng, Li [1 ]
Yan, Zheng [1 ]
Liang, Xueqin [1 ]
Yu, Xixun [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted deduplication; Auditing; Dynamic updating; Data ownership; Attack resistance; INTEGRITY;
D O I
10.1016/j.ins.2023.119279
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of big data, data explosion has brought challenges to cloud storage management. To improve cloud storage efficiency and save network communication bandwidth, cloud data deduplication has emerged as a research hotspot, especially in the field of encrypted cloud data storage. How to enhance the security of encrypted data deduplication by resisting various attacks on deduplication has become an important research issue. However, existing solutions suffer from security flaws and are vulnerable to a series of attacks, e.g., duplicate faking attacks, file ownership spoofing attacks, and file tampering attacks. Besides, dynamic data operation is rarely considered or audited. To solve the above problems, we propose a novel scheme, named SecDedup, to enhance the security of encrypted cloud data deduplication with dynamic auditing. SecDedup applies a homomorphic authenticator and designs a multi-functional data tag with optimized storage to support deduplication and auditing at the same time with security guarantee against various attacks as mentioned above. In particular, We embed multi-set hash functions into data tags to achieve dynamic data auditing. In addition, SecDedup supports batch auditing with optimized computational cost for multiple deduplication auditing tasks. We formally prove the correctness and security of SecDedup, showing that it can successfully achieve our design goals for resisting the above listed attacks. We also analyze and evaluate the performance of SecDedup in terms of computation, communication, and tag storage overheads by comparing them with existing works. The results show its effectiveness and scalability.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud
    Dinesh, N.
    Juvanna, I.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 305 - 313
  • [2] SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating
    Zhang, Shuguang
    Xian, Hequn
    Li, Zengpeng
    Wang, Liming
    IEEE ACCESS, 2020, 8 : 186323 - 186334
  • [3] Secure and efficient cloud data deduplication supporting dynamic data public auditing
    Ma, Hua
    Han, Xiaoyu
    Peng, Ting
    Zhang, Linchao
    International Journal of Network Security, 2018, 20 (06) : 1074 - 1084
  • [4] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [5] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    Cluster Computing, 2024, 27 : 2203 - 2215
  • [6] Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wu, Yulin
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Peng
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 562 - 567
  • [7] Public Auditing and Secure Deduplication of Dynamic Data Based on Blockchain
    Tian, Yanan
    Tan, Shichong
    Tian, Guohua
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 12 - 21
  • [8] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Jianli Bai
    Jia Yu
    Xiang Gao
    Soft Computing, 2020, 24 : 12197 - 12214
  • [9] A secure privacy-preserving cloud auditing scheme with data deduplication
    Li, Chen
    Liu, Zhenhua
    International Journal of Network Security, 2019, 21 (02) : 199 - 210
  • [10] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Bai, Jianli
    Yu, Jia
    Gao, Xiang
    SOFT COMPUTING, 2020, 24 (16) : 12197 - 12214