SecDedup: Secure data deduplication with dynamic auditing in the cloud

被引:7
|
作者
Peng, Li [1 ]
Yan, Zheng [1 ]
Liang, Xueqin [1 ]
Yu, Xixun [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted deduplication; Auditing; Dynamic updating; Data ownership; Attack resistance; INTEGRITY;
D O I
10.1016/j.ins.2023.119279
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of big data, data explosion has brought challenges to cloud storage management. To improve cloud storage efficiency and save network communication bandwidth, cloud data deduplication has emerged as a research hotspot, especially in the field of encrypted cloud data storage. How to enhance the security of encrypted data deduplication by resisting various attacks on deduplication has become an important research issue. However, existing solutions suffer from security flaws and are vulnerable to a series of attacks, e.g., duplicate faking attacks, file ownership spoofing attacks, and file tampering attacks. Besides, dynamic data operation is rarely considered or audited. To solve the above problems, we propose a novel scheme, named SecDedup, to enhance the security of encrypted cloud data deduplication with dynamic auditing. SecDedup applies a homomorphic authenticator and designs a multi-functional data tag with optimized storage to support deduplication and auditing at the same time with security guarantee against various attacks as mentioned above. In particular, We embed multi-set hash functions into data tags to achieve dynamic data auditing. In addition, SecDedup supports batch auditing with optimized computational cost for multiple deduplication auditing tasks. We formally prove the correctness and security of SecDedup, showing that it can successfully achieve our design goals for resisting the above listed attacks. We also analyze and evaluate the performance of SecDedup in terms of computation, communication, and tag storage overheads by comparing them with existing works. The results show its effectiveness and scalability.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [32] Secure Cloud Encrypted Data Deduplication Method
    Zhang S.-G.
    Xian H.-Q.
    Wang L.-M.
    Liu H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (12): : 3815 - 3828
  • [33] A hybrid encryption for secure data deduplication the cloud
    Ebinazer S.E.
    Savarimuthu N.
    Bhanu S.M.S.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 295 - 307
  • [34] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235
  • [35] Secure Auditing and Deduplicating Data in Cloud
    Li, Jingwei
    Li, Jin
    Xie, Dongqing
    Cai, Zhang
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2386 - 2396
  • [36] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [37] Dynamic Data Deduplication in Cloud Storage
    Leesakul, Waraporn
    Townend, Paul
    Xu, Jie
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 320 - 325
  • [38] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [39] DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
    Ghassabi, Kiana
    Pahlevani, Peyman
    IEEE ACCESS, 2024, 12 : 70743 - 70758
  • [40] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543