Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage

被引:31
|
作者
Stanek, Jan [1 ]
Kencl, Lukas [1 ]
机构
[1] Czech Tech Univ, Fac Elect Engn, Prague 16636 6, Czech Republic
关键词
Security; data protection; deduplication; convergent encryption; cloud storage; popularity; EFFICIENT;
D O I
10.1109/TDSC.2016.2603501
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As more corporate and private users outsource their data to cloud storage, recent data breach incidents make end-to-end encryption increasingly desirable. Unfortunately, semantically secure encryption renders various cost-effective storage optimization techniques, such as data deduplication, ineffective. On this ground Stanek et al [1] introduced the concept of "data popularity" arguing that data known/owned by many users do not require as strong protection as unpopular data; based on this, Stanek et al. presented an encryption scheme, where the initially semantically secure ciphertext of a file is transparently downgraded to a convergent ciphertext that allows for deduplication as soon as the file becomes popular. In this paper we propose an enhanced version of the original scheme Focusing on practicality, we modify the original scheme to improve its efficiency and emphasize clear functionality. We analyze the efficiency based on popularity properties of real datasets and provide a detailed performance evaluation, including comparison to alternative schemes in real-like settings. Importantly, the new scheme moves the handling of sensitive decryption shares and popularity state information out of the cloud storage, allowing for improved security notion, simpler security proofs and easier adoption. We show that the new scheme is secure under the Symmetric External Diffie-Hellman assumption in the random oracle model.
引用
收藏
页码:694 / 707
页数:14
相关论文
共 50 条
  • [21] A Review on Secure Data Deduplication: Cloud Storage Security Issue
    Prajapati, Priteshkumar
    Shah, Parth
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 3996 - 4007
  • [22] Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage
    Ma, Hua
    Tian, Guohua
    Liu, Zhenhua
    Zhang, Linchao
    [J]. FRONTIERS IN CYBER SECURITY, 2018, 879 : 168 - 176
  • [23] Secure Deduplication on Public Cloud Storage
    Graupner, Hendrik
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Meinel, Christoph
    [J]. ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 34 - 41
  • [24] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    [J]. Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [25] Secure Image Deduplication in Cloud Storage
    Gang, Han
    Yan, Hongyang
    Xu, Lingling
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 243 - 251
  • [26] Secure deduplication for multimedia data with user revocation in cloud storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Hur, Junbeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5889 - 5903
  • [27] A secure privacy-preserving cloud auditing scheme with data deduplication
    Li, Chen
    Liu, Zhenhua
    [J]. International Journal of Network Security, 2019, 21 (02) : 199 - 210
  • [28] ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
    Ebinazer, Silambarasan Elkana
    Savarimuthu, Nickolas
    Bhanu, S. Mary Saira
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3309 - 3325
  • [29] ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
    Silambarasan Elkana Ebinazer
    Nickolas Savarimuthu
    S. Mary Saira Bhanu
    [J]. Wireless Personal Communications, 2021, 117 : 3309 - 3325
  • [30] Secure proof of storage with deduplication for cloud storage systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    Yun, Joobeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19363 - 19378