LSDedup: Layered Secure Deduplication for Cloud Storage

被引:4
|
作者
Song, Mingyang [1 ]
Hua, Zhongyun [1 ,2 ]
Zheng, Yifeng [1 ]
Huang, Hejiao [1 ,2 ]
Jia, Xiaohua [1 ,3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Guangdong, Peoples R China
[2] Guangdong Prov Key Lab Novel Secur Intelligence T, Shenzhen 518055, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; encrypted data deduplication; layered deduplication; secure deduplication; cloud storage security;
D O I
10.1109/TC.2023.3331953
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To implement encrypted data deduplication in a cloud storage system, users must encrypt files using special encryption algorithms (e.g., convergent encryption (CE)), which cannot provide strong protection. The confidential level of an outsourced file is determined by the user himself/herself subjectively or by the owner number of the file objectively. These files owned by a few users are considered strictly confidential and require strong protection. In this paper, we design, analyze and implement LSDedup, which attains a high storage efficiency while providing strictly confidential files (SCFiles) with strong protection. LSDedup allows cloud users to securely interact with cloud servers to check the confidential level of an outsourced file. Users encrypt the SCFiles using standard symmetric encryption algorithms to achieve a high security level, whereas encrypting the less confidential files (LSFiles) using CE such that cloud servers can perform deduplication. LSDedup is designed to prevent cloud servers reporting fake confidential level and a fake file user claiming the ownership of the file. Formal analysis is provided to justify its security. Besides, we implement an LSDedup prototype using Alibaba Cloud as backend storage. Our evaluations demonstrate that LSDedup can work with existing cloud service providers' APIs and achieves modest performance overhead.
引用
下载
收藏
页码:422 / 435
页数:14
相关论文
共 50 条
  • [21] A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [22] Secure auditing and deduplication with efficient ownership management for cloud storage
    Wang, Min
    Xu, Lujun
    Hao, Rong
    Yang, Ming
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [23] A Review on Secure Data Deduplication: Cloud Storage Security Issue
    Prajapati, Priteshkumar
    Shah, Parth
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 3996 - 4007
  • [24] Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage
    Ma, Hua
    Tian, Guohua
    Liu, Zhenhua
    Zhang, Linchao
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 168 - 176
  • [25] Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Koo, Dongyoung
    Hur, Junbeom
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 391 - 398
  • [26] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [27] Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
    Yuan, Jiawei
    Yu, Shucheng
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 145 - 153
  • [28] A Secure Client Side Deduplication Scheme in Cloud Storage Environments
    Kaaniche, Nesrine
    Laurent, Maryline
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [29] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [30] Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
    Tang, Heyi
    Cui, Yong
    Guan, Chaowen
    Wu, Jianping
    Weng, Jian
    Ren, Kui
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 59 - 70