An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage

被引:5
|
作者
Su, Haonan [1 ,2 ]
Zheng, Dong [1 ,2 ]
Zhang, Yinghui [1 ,3 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[3] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud computing; deduplication; Rabin fingerprinting; convergent encryption;
D O I
10.1109/CSE-EUC.2017.166
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data deduplication has been widely used in backups to save storage space and network bandwidth. In order to improve efficiency and security of the current deduplication schemes, this paper proposes a secure deduplication scheme. The proposed scheme supports cloud storage servers to eliminate deduplicate data before users' encryption operations, which can reduce computation overheads. Our scheme realizes variable-size block-level deduplication based on the technique of Rabin fingerprinting. Rabin fingerprinting selects blocks based on property of the block contents and hence supports data update and variable files. In the proposed scheme, a trusted third-party server is introduced to randomize the convergent keys and manage them. Security analysis indicates the proposed scheme is secure against offline brute-force dictionary attacks.
引用
收藏
页码:833 / 836
页数:4
相关论文
共 50 条
  • [1] Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing
    Zhang, Yinghui
    Su, Haonan
    Yang, Menglei
    Zheng, Dong
    Ren, Fang
    Zhao, Qinglan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [2] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [3] Efficient and Secure File Deduplication in Cloud Storage
    Shin, Youngjoo
    Kim, Kwangjo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 184 - 197
  • [4] A key-sharing based secure deduplication scheme in cloud storage
    Wang, Liang
    Wang, Baocang
    Song, Wei
    Zhang, Zhili
    [J]. INFORMATION SCIENCES, 2019, 504 : 48 - 60
  • [5] SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
    Sanjeet Kumar Nayak
    Somanath Tripathy
    [J]. International Journal of Information Security, 2020, 19 : 229 - 240
  • [6] A Universal Deduplication Architecture for Secure and Efficient Cloud Storage
    Saric, Kevin
    Ramachandran, Gowri Sankar
    Pal, Shantanu
    Jurdak, Raja
    Nepal, Surya
    [J]. 2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 10 - 19
  • [7] Secure deduplication with efficient user revocation in cloud storage
    Wang, Yunling
    Miao, Meixia
    Wang, Jianfeng
    Zhang, Xuefeng
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 78 (78)
  • [8] SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 229 - 240
  • [9] Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure
    Liu, Jiasen
    Wang, Xu An
    Zhao, Kaiyang
    Wang, Han
    [J]. ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 290 - 300
  • [10] A Secure Client Side Deduplication Scheme in Cloud Storage Environments
    Kaaniche, Nesrine
    Laurent, Maryline
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,