Merkle Hash Tree based Deduplication in Cloud Storage

被引:0
|
作者
Li, Chaoling [1 ]
Chen, Yue [2 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
Cloud Storage; Sensitive Data Deduplication; Proofs of Ownership; Merkle Hash Tree;
D O I
10.4028/www.scientific.net/AMM.556-562.6223
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To deduplicate the sensitive data in a cloud storage center, a scheme called as MHT-Dedup that is based on MHT (Merkle Hash Tree) is proposed. It achieves the cross-user file-level client-side deduplication and local block-level client-side deduplication concurrently. It firstly encrypts the file on block granularity, and then authenticates the file ciphertext to find duplicated files (Proofs of oWnership, PoW) and check the hash of block plaintext to find duplicated blocks. In the PoW protocol of MHT-Dedup, an authenticating binary tree is generated from the tags of encrypted blocks to assuredly find the duplicated files. MHT-Dedup gets rid of the conflict between data deduplication and encryption, achieves the file-level and block-level deduplication concurrently, avoids the misuse of storage system by users, resists to the inside and outside attacks to data confidentiality, and prevents the target collision attack to files and brute force attack to blocks.
引用
收藏
页码:6223 / 6227
页数:5
相关论文
共 50 条
  • [1] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [2] The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree
    Yi, Xiushuang
    Wang, Weiqiang
    [J]. 2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 217 - 221
  • [3] AF-Dedup: Secure Encrypted Data Deduplication Based on Adaptive Dynamic Merkle Hash Forest PoW for Cloud Storage
    Guo, Xinyue
    Xian, Hequn
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, : 12294 - 12304
  • [4] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [5] Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
    Rao, Lu
    Zhang, Hua
    Tu, Tengfei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 451 - 463
  • [6] An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud
    Sujatha, G.
    Retnaraj, R. Jeberson
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [7] Distributed Storage Hash Algorithm (DSHA) for File-Based Deduplication in Cloud Computing
    Hema, S.
    Kangaiammal, A.
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 572 - 581
  • [8] Hash-Indexing Block-Based Deduplication Algorithm for Reducing Storage in the Cloud
    Viji, D.
    Revathy, S.
    [J]. Computer Systems Science and Engineering, 2023, 46 (01): : 27 - 42
  • [9] A Data Deduplication Method in the Cloud Storage Based on FP-tree
    Wan Haoran
    Tong Weiqin
    Gao Qiang
    Zheng Shengan
    [J]. PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 557 - 562
  • [10] Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain
    He, Kai
    Huang, Chunxiao
    Shi, Jiaoli
    Hu, Xinrong
    Fan, Xiying
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021