A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems

被引:84
|
作者
Shin, Youngjoo [1 ]
Koo, Dongyoung [2 ]
Hur, Junbeom [2 ]
机构
[1] Natl Secur Res Inst, 1559 Yuseongdae Ro, Daejeon 34044, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, 145 Anam Ro, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Message-dependent encryption; proof of ownership; traffic obfuscation; deterministic information dispersal; PROVABLE OWNERSHIP; EFFICIENT; INFORMATION; FILES;
D O I
10.1145/3017428
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly accepted, it comes with many security and privacy problems due to the outsourced data delivery models of cloud storage. To deal with specific security and privacy issues, secure deduplication techniques have been proposed for cloud data, leading to a diverse range of solutions and trade-offs. Hence, in this article, we discuss ongoing research on secure deduplication for cloud data in consideration of the attack scenarios exploited most widely in cloud storage. On the basis of classification of deduplication system, we explore security risks and attack scenarios from both inside and outside adversaries. We then describe state-of-the-art secure deduplication techniques for each approach that deal with different security issues under specific or combined threat models, which include both cryptographic and protocol solutions. We discuss and compare each scheme in terms of security and efficiency specific to different security goals. Finally, we identify and discuss unresolved issues and further research challenges for secure deduplication in cloud storage.
引用
收藏
页数:38
相关论文
共 50 条
  • [21] Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage
    Qi, Saiyu
    Wei, Wei
    Wang, Jianfeng
    Sun, Shifeng
    Rutkowski, Leszek
    Huang, Tingwen
    Kacprzyk, Janusz
    Qi, Yong
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2566 - 2582
  • [22] Secure Enterprise Data Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 367 - 374
  • [23] FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
    Jiang, Tao
    Yuan, Xu
    Chen, Yuan
    Cheng, Ke
    Wang, Liangmin
    Chen, Xiaofeng
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2466 - 2483
  • [24] Cloud Storage: A Review on Secure Deduplication and Issues
    Joice, S. Annie
    Mohamed, M. A. Maluk
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (03): : 861 - 873
  • [25] A Secure Hierarchical Deduplication System in Cloud Storage
    Yao, Xin
    Lin, Yaping
    Liu, Qin
    Zhang, Yanchao
    [J]. 2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [26] LSDedup: Layered Secure Deduplication for Cloud Storage
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Huang, Hejiao
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (02) : 422 - 435
  • [27] Efficient and Secure File Deduplication in Cloud Storage
    Shin, Youngjoo
    Kim, Kwangjo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 184 - 197
  • [28] Secure data deletion in cloud storage: a survey
    Hua, Minyao
    Zhao, Yinyuan
    Jiang, Tao
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (02) : 253 - 265
  • [29] Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment
    Kim, Won-Bin
    Lee, Im-Yeong
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 539 - 545
  • [30] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258