A Universal Deduplication Architecture for Secure and Efficient Cloud Storage

被引:3
|
作者
Saric, Kevin [1 ]
Ramachandran, Gowri Sankar [2 ]
Pal, Shantanu [3 ]
Jurdak, Raja [2 ]
Nepal, Surya [4 ]
机构
[1] Queensland Univ Technol, Cyber Secur Cooperat Res Ctr, CSIRO Data61, Brisbane, Australia
[2] Queensland Univ Technol, Brisbane, Australia
[3] Deakin Univ, Melbourne, Australia
[4] CSCRC, CSIRO Data61, Sydney, Australia
关键词
Deduplication; Secure Deduplication; Universal Deduplication; Encryption; End-to-End Encryption; E2EE; Architecture; Recipes; Cloud;
D O I
10.1109/TPS-ISA56441.2022.00012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Users now produce data at a rate that exceeds their ability to securely store and manage it all, provoking them to entrust their private files to Cloud Storage Providers (CSPs). These companies discreetly inspect users' files to undertake deduplication, which stores only a single instance of files that are redundant across their user base. By undertaking deduplication in this way, the CSP acquires low-cost storage at the expense of user privacy. This paper proposes universal deduplication, an alternative approach which shifts the advantage of deduplication from the CSP to the users, while ensuring semantic security of the users' transmitted data. Universal deduplication leverages indications of the trustworthiness of data availability on the Internet, paired with a format to automatically combine clientside deduplication and end-to-end encryption. By referencing data that is publicly available on the Internet, user files can be privately deduplicated without the need to transmit sensitive user data, while simultaneously reducing storage and encryption costs. An architecture for the implementation of universal deduplication is proposed in this paper, along with a preliminary investigation into the feasibility of the proposed concepts.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 50 条
  • [1] Efficient and Secure File Deduplication in Cloud Storage
    Shin, Youngjoo
    Kim, Kwangjo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 184 - 197
  • [2] Secure deduplication with efficient user revocation in cloud storage
    Wang, Yunling
    Miao, Meixia
    Wang, Jianfeng
    Zhang, Xuefeng
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 78 (78)
  • [3] Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure
    Liu, Jiasen
    Wang, Xu An
    Zhao, Kaiyang
    Wang, Han
    [J]. ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 290 - 300
  • [4] Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
    Lee, Mira
    Seo, Minhye
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [5] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    [J]. Cluster Computing, 2024, 27 : 2203 - 2215
  • [6] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [7] Secure auditing and deduplication with efficient ownership management for cloud storage
    Wang, Min
    Xu, Lujun
    Hao, Rong
    Yang, Ming
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [8] Secure Deduplication on Public Cloud Storage
    Graupner, Hendrik
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Meinel, Christoph
    [J]. ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 34 - 41
  • [9] Secure Image Deduplication in Cloud Storage
    Gang, Han
    Yan, Hongyang
    Xu, Lingling
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 243 - 251
  • [10] An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage
    Su, Haonan
    Zheng, Dong
    Zhang, Yinghui
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 833 - 836