Secure cloud storage with anonymous deduplication using ID-based key management

被引:3
|
作者
Gharib, Mohammed [1 ]
Fazli, MohammadAmin [2 ]
机构
[1] Inst Res Fundamental Sci, Tehran, Iran
[2] Sharif Univ Technol, Tehran, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 02期
关键词
Cloud storage; Deduplication; Anonymity;
D O I
10.1007/s11227-022-04751-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage systems have been turned into the primary services of Internet users nowadays. While the application of such systems is exponentially increasing, deduplication algorithms help face scalability issues. Although source-side deduplication optimizes both storage and bandwidth, the main concern that deduplication algorithms suffer from is still data confidentiality. Message-locked encryption (MLE) is a well-known key management framework for secure deduplication to provide confidentiality. This framework is the basis of almost all the proposed secure deduplication solutions. Even though there are lots of literature works trying to provide secure deduplication algorithms, to the best of our knowledge, none of them provide an effective anonymity service for data owners. In this paper, we propose an N-anonymity algorithm to provide an effective anonymity service, capable of prohibiting even the cloud storage provider from knowing which users are storing the same data. The algorithm is analytically studied, and the results are validated by exhaustive implementations using real data. Furthermore, we propose an ID-based key management algorithm as the cornerstone of the secure cloud storage system. The proposed algorithm, which could be considered as an asymmetric extension of MLE, is easy to implement and compatible with the existed cloud architectures as well as the proposed anonymity-based deduplication system.
引用
收藏
页码:2356 / 2382
页数:27
相关论文
共 50 条
  • [41] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [42] ID-based Key Management Scheme using Threshold Decryption for OPMD Environment
    Lee, Hoonjung
    Kim, Junghoon
    Son, Junggab
    Kim, Sangjin
    Oh, Heekuck
    2012 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2012, : 733 - +
  • [43] An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards
    Reddy, Goutham A.
    Lee, Gil-Je
    Yoo, Kee-Young
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 169 - 174
  • [44] id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
    Fujioka, Atsushi
    Hoshino, Fumitaka
    Kobayashi, Tetsutaro
    Suzuki, Koutarou
    Ustaoglu, Berkant
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1139 - 1155
  • [45] Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
    Xie, Qi
    Wong, Duncan S.
    Wang, Guilin
    Tan, Xiao
    Chen, Kefei
    Fang, Liming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1382 - 1392
  • [46] Efficient ID-based public auditing for the outsourced data in cloud storage
    Zhang, Jianhong
    Dong, Qiaocui
    INFORMATION SCIENCES, 2016, 343 : 1 - 14
  • [47] RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage
    Mishra, Shivansh
    Singh, Surjit
    Ali, Syed Taqi
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [48] An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage
    Su, Haonan
    Zheng, Dong
    Zhang, Yinghui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 833 - 836
  • [49] Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage (Extended Abstract)
    Hur, Junbeom
    Koo, Dongyoung
    Shin, Youngjoo
    Kang, Kyungtae
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 69 - 70
  • [50] An ID-based proxy signature scheme secure against proxy key exposure
    Wen F.
    Cui S.
    Cui J.
    International Journal of Advancements in Computing Technology, 2011, 3 (05) : 108 - 116