Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage

被引:34
|
作者
Stanek, Jan [1 ]
Kencl, Lukas [1 ]
机构
[1] Czech Tech Univ, Fac Elect Engn, Prague 16636 6, Czech Republic
关键词
Security; data protection; deduplication; convergent encryption; cloud storage; popularity; EFFICIENT;
D O I
10.1109/TDSC.2016.2603501
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As more corporate and private users outsource their data to cloud storage, recent data breach incidents make end-to-end encryption increasingly desirable. Unfortunately, semantically secure encryption renders various cost-effective storage optimization techniques, such as data deduplication, ineffective. On this ground Stanek et al [1] introduced the concept of "data popularity" arguing that data known/owned by many users do not require as strong protection as unpopular data; based on this, Stanek et al. presented an encryption scheme, where the initially semantically secure ciphertext of a file is transparently downgraded to a convergent ciphertext that allows for deduplication as soon as the file becomes popular. In this paper we propose an enhanced version of the original scheme Focusing on practicality, we modify the original scheme to improve its efficiency and emphasize clear functionality. We analyze the efficiency based on popularity properties of real datasets and provide a detailed performance evaluation, including comparison to alternative schemes in real-like settings. Importantly, the new scheme moves the handling of sensitive decryption shares and popularity state information out of the cloud storage, allowing for improved security notion, simpler security proofs and easier adoption. We show that the new scheme is secure under the Symmetric External Diffie-Hellman assumption in the random oracle model.
引用
收藏
页码:694 / 707
页数:14
相关论文
共 50 条
  • [1] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [2] Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment
    Kim, Won-Bin
    Lee, Im-Yeong
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 539 - 545
  • [3] Deduplication scheme with data popularity for cloud storage
    He X.
    Yang Q.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (01): : 187 - 200
  • [4] A Secure Client Side Deduplication Scheme in Cloud Storage Environments
    Kaaniche, Nesrine
    Laurent, Maryline
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [5] SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
    Sanjeet Kumar Nayak
    Somanath Tripathy
    [J]. International Journal of Information Security, 2020, 19 : 229 - 240
  • [6] SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 229 - 240
  • [7] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [8] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    [J]. Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470
  • [9] SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-side Data Deduplication
    Islam, Tariqul
    Mistareehi, Hassan
    Manivannan, D.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [10] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    Abhishek Kumar Singh
    P. J. A. Alphonse
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 102 - 120