A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters

被引:0
|
作者
Blasco, Jorge [1 ]
Di Pietro, Roberto [2 ]
Orfila, Agustin [1 ]
Sorniotti, Alessandro [3 ]
机构
[1] Carlos III Univ, Madrid, Spain
[2] Bell Labs, Secur Res Dept, Nozay, France
[3] IBM Res, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deduplication is a widely used technique in storage services, since it affords a very efficient usage of resourcesbeing especially effective for consumer-grade storage services (e.g. Dropbox). Deduplication has been shown to suffer from several security weaknesses, the most severe ones enabling a malicious user to obtain possession of a file it is not entitled to. Standard solutions to this problem require users to prove possession of data prior to its upload. Unfortunately, the schemes proposed in the literature are very taxing on either the server or the client side. In this paper, we introduce a novel solution based on Bloom filters that provides a flexible, scalable, and provably secure solution to the weaknesses of deduplication, and that overcomes the deficiencies of existing approaches. We provide a formal description of the scheme, a thorough security analysis, and compare our solution against multiple existing ones, both analytically and by means of extensive benchmarking. Our results confirm the quality and viability of our approach.
引用
收藏
页码:481 / 489
页数:9
相关论文
共 50 条
  • [1] An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
    Zhou Y.
    Yu Z.
    Gu L.
    Feng D.
    BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 2022, 2 (02):
  • [2] Secure and Efficient Proof of Ownership Scheme for Client-Side Deduplication in Cloud Environments
    Al-Amer, Amer
    Ouda, Osama
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 916 - 923
  • [3] Secure and Efficient Proof of Ownership Scheme for Client-Side Deduplication in Cloud Environments
    Al-Amer, Amer
    Ouda, Osama
    International Journal of Advanced Computer Science and Applications, 2021, 12 (12): : 916 - 923
  • [4] Deduplication in cloud storage on the basis of proof of ownership
    Sirsat, Rupali Bhimrao
    Talhar, Nitin. R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [5] Boosting Efficiency and Security in Proof of Ownership for Deduplication
    Di Pietro, Roberto
    Sorniotti, Alessandro
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [6] Improving dynamic ownership scheme for data Deduplication
    Kim, Won-Bin
    Lee, Im-Yeong
    Ryou, Jae-Cheol
    2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017, : 333 - 336
  • [7] An efficient confidentiality-preserving Proof of Ownership for deduplication
    Gonzalez-Manzano, Lorena
    Orfila, Agustin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 50 : 49 - 59
  • [8] Anonymous Deduplication of Encrypted Data with Proof of Ownership in Cloud Storage
    Jin, Xuexue
    Wei, Lingbo
    Yu, Mengke
    Yu, Nenghai
    Sun, Jinyuan
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 224 - 229
  • [9] Secure Encrypted Data Deduplication with Ownership Proof and User Revocation
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 297 - 312
  • [10] Proof of Retrieval and Ownership for Secure Fuzzy Deduplication of Multimedia Data
    Bini, S. Preetha
    Abirami, S.
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 245 - 255