Merkle Hash Tree based Deduplication in Cloud Storage

被引:0
|
作者
Li, Chaoling [1 ]
Chen, Yue [2 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
Cloud Storage; Sensitive Data Deduplication; Proofs of Ownership; Merkle Hash Tree;
D O I
10.4028/www.scientific.net/AMM.556-562.6223
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To deduplicate the sensitive data in a cloud storage center, a scheme called as MHT-Dedup that is based on MHT (Merkle Hash Tree) is proposed. It achieves the cross-user file-level client-side deduplication and local block-level client-side deduplication concurrently. It firstly encrypts the file on block granularity, and then authenticates the file ciphertext to find duplicated files (Proofs of oWnership, PoW) and check the hash of block plaintext to find duplicated blocks. In the PoW protocol of MHT-Dedup, an authenticating binary tree is generated from the tags of encrypted blocks to assuredly find the duplicated files. MHT-Dedup gets rid of the conflict between data deduplication and encryption, achieves the file-level and block-level deduplication concurrently, avoids the misuse of storage system by users, resists to the inside and outside attacks to data confidentiality, and prevents the target collision attack to files and brute force attack to blocks.
引用
收藏
页码:6223 / 6227
页数:5
相关论文
共 50 条
  • [21] Implement Efficient Data Integrity for Cloud Distributed File System Using Merkle Hash Tree
    Tseng, Fan-Hsun
    Chou, Li-Der
    Chiang, Hua-Pei
    Yu, Wei-Jen
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02): : 307 - 316
  • [22] Merkle Tree and Blockchain-Based Cloud Data Auditing
    Mohan, Arun Prasad
    Asfak, Mohamed R.
    Gladston, Angelin
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (03) : 54 - 66
  • [23] RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 : 1 - 13
  • [24] Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage
    Thangavel, M.
    Varalakshmi, P.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (12) : 2351 - 2362
  • [25] Big Data Cloud Deduplication based on Verifiable Hash Convergent Group Signcryption
    Cho, Ei Mon
    Koshiba, Takeshi
    [J]. 2017 THIRD IEEE INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2017), 2017, : 265 - 270
  • [26] An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
    Kaveh, Masoud
    Falahati, Abolfazl
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (07) : 1010 - 1019
  • [27] An FPGA Accelerator for Hash Tree Generation in the Merkle Signature Scheme
    Shoufan, Abdulhadi
    [J]. RECONFIGURABLE COMPUTING: ARCHITECTURES, TOOLS AND APPLICATIONS, 2010, 5992 : 145 - 156
  • [28] MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
    Liu, Chang
    Ranjan, Rajiv
    Yang, Chi
    Zhang, Xuyun
    Wang, Lizhe
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2609 - 2622
  • [29] Merkle Hash Grids Instead of Merkle Trees
    Paris, Jehan-Francois
    Schwarz, Thomas
    [J]. 2020 IEEE 28TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2020), 2020, : 95 - 102
  • [30] Research on E-commerce User Information Encryption Technology Based on Merkle Hash tree
    Qing, Li
    [J]. 2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 365 - 369