Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup

被引:0
|
作者
Sun, Wenhai [1 ]
Zhang, Ning [1 ]
Lou, Wenjing [1 ]
Hou, Y. Thomas [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We, in this work, investigate the problem of designing a secure chunk-based deduplication scheme in the enterprise backup storage setting. Most of the existing works focus on realizing file-level encrypted data deduplication or key/metadata management. Little attention is drawn to the practical chunk-level deduplication system. In particular, we identify that the information contained in a small-sized chunk is more susceptible to the brute-force attack compared with file-based deduplication. We propose a randomized oblivious key generation mechanism based on the inner workings of the backup service. In contrast with the current work that compromising one client will eventually expose all the clients' storage, our scheme offers a counter-intuitive property of achieving security against multiclient compromise with minimal deduplication performance loss. In addition, we enforce a per-backup rate-limiting policy to slow down the online brute-force attack. We show that the proposed scheme is provably secure in the malicious model. We also calibrate the system design by taking into account the practical deduplication requirements to accomplish a comparable plaintext deduplication performance. Our experiment on the real-world dataset shows its efficiency, effectiveness, and practicality.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Extreme Binning: Scalable, Parallel Deduplication for Chunk-based File Backup
    Bhagwat, Deepavali
    Eshghi, Kave
    Long, Darrell D. E.
    Lillibridge, Mark
    2009 IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS & SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS), 2009, : 237 - +
  • [2] Improving restore speed for backup systems that use inline chunk-based deduplication
    Lillibridge, Mark
    Eshghi, Kave
    Bhagwat, Deepavali
    HP Laboratories Technical Report, 2013, (41):
  • [3] Secure Encrypted Data With Authorized Deduplication in Cloud
    Xiong, Jinbo
    Zhang, Yuanyuan
    Tang, Shaohua
    Liu, Ximeng
    Yao, Zhiqiang
    IEEE ACCESS, 2019, 7 : 75090 - 75104
  • [4] Secure Cloud Encrypted Data Deduplication Method
    Zhang S.-G.
    Xian H.-Q.
    Wang L.-M.
    Liu H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (12): : 3815 - 3828
  • [5] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [6] Advanced chunk-based data deduplication framework for secure data storage in cloud using hybrid heuristic assisted optimal key-based encryption
    Ruba, S.
    Kalpana, A. M.
    WIRELESS NETWORKS, 2025, : 3467 - 3489
  • [7] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [8] Secure Encrypted Data Deduplication Based on Data Popularity
    Yunlong He
    Hequn Xian
    Liming Wang
    Shuguang Zhang
    Mobile Networks and Applications, 2021, 26 : 1686 - 1695
  • [9] Secure Encrypted Data Deduplication Based on Data Popularity
    He, Yunlong
    Xian, Hequn
    Wang, Liming
    Zhang, Shuguang
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1686 - 1695
  • [10] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Bai, Jianli
    Yu, Jia
    Gao, Xiang
    SOFT COMPUTING, 2020, 24 (16) : 12197 - 12214