Secure proof of storage with deduplication for cloud storage systems

被引:9
|
作者
Shin, Youngjoo [1 ]
Koo, Dongyoung [2 ]
Hur, Junbeom [3 ]
Yun, Joobeom [4 ]
机构
[1] ETRI, Affiliated Inst, Daejeon, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Comp Sci, Daedeok Innopolis, South Korea
[3] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud computing; Multimedia content security; Cloud storage; Proof of data possession; Proof of retrievability; Proof of ownership; Data deduplication; RETRIEVABILITY;
D O I
10.1007/s11042-015-2956-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.
引用
收藏
页码:19363 / 19378
页数:16
相关论文
共 50 条
  • [31] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [32] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [33] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    Cluster Computing, 2024, 27 : 2203 - 2215
  • [34] Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage
    Gajera, Hardik
    Das, Manik Lal
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 237 - 241
  • [35] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [36] A Secure Client Side Deduplication Scheme in Cloud Storage Environments
    Kaaniche, Nesrine
    Laurent, Maryline
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [37] Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
    Tang, Heyi
    Cui, Yong
    Guan, Chaowen
    Wu, Jianping
    Weng, Jian
    Ren, Kui
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 59 - 70
  • [38] Secure deduplication for multimedia data with user revocation in cloud storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5889 - 5903
  • [39] Secure deduplication storage systems supporting keyword search
    Li, Jin
    Chen, Xiaofeng
    Xhafa, Fatos
    Barolli, Leonard
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) : 1532 - 1541
  • [40] Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
    Mageshkumar N.
    Swapna J.
    Pandiaraj A.
    Rajakumar R.
    Krichen M.
    Ravi V.
    International Journal of Intelligent Networks, 2023, 4 : 301 - 309