Merkle Hash Tree based Deduplication in Cloud Storage

被引:0
|
作者
Li, Chaoling [1 ]
Chen, Yue [2 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
Cloud Storage; Sensitive Data Deduplication; Proofs of Ownership; Merkle Hash Tree;
D O I
10.4028/www.scientific.net/AMM.556-562.6223
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To deduplicate the sensitive data in a cloud storage center, a scheme called as MHT-Dedup that is based on MHT (Merkle Hash Tree) is proposed. It achieves the cross-user file-level client-side deduplication and local block-level client-side deduplication concurrently. It firstly encrypts the file on block granularity, and then authenticates the file ciphertext to find duplicated files (Proofs of oWnership, PoW) and check the hash of block plaintext to find duplicated blocks. In the PoW protocol of MHT-Dedup, an authenticating binary tree is generated from the tags of encrypted blocks to assuredly find the duplicated files. MHT-Dedup gets rid of the conflict between data deduplication and encryption, achieves the file-level and block-level deduplication concurrently, avoids the misuse of storage system by users, resists to the inside and outside attacks to data confidentiality, and prevents the target collision attack to files and brute force attack to blocks.
引用
收藏
页码:6223 / 6227
页数:5
相关论文
共 50 条
  • [41] Side Channels in Cloud Services Deduplication in Cloud Storage
    Harnik, Danny
    Pinkas, Benny
    Shulman-Peleg, Alexandra
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (06) : 40 - 47
  • [42] Blockchain-Based Dynamic Cloud Data Integrity Auditing via Non-Leaf Node Sampling of Rank-Based Merkle Hash Tree
    Wang, Chenxu
    Sun, Yifan
    Liu, Boyang
    Xue, Lei
    Guan, Xiaohong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 3931 - 3942
  • [43] Secure proof of storage with deduplication for cloud storage systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    Yun, Joobeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19363 - 19378
  • [44] Secure proof of storage with deduplication for cloud storage systems
    Youngjoo Shin
    Dongyoung Koo
    Junbeom Hur
    Joobeom Yun
    [J]. Multimedia Tools and Applications, 2017, 76 : 19363 - 19378
  • [45] Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree
    Chen, Ding
    Aljohani, Abeer
    [J]. MOBILE NETWORKS & APPLICATIONS, 2024,
  • [46] Efficient certificate revocation system implementation:: Huffman merkle hash tree (HuffMHT)
    Muñoz, JL
    Forné, J
    Esparza, O
    Rey, M
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 119 - 127
  • [47] A key-sharing based secure deduplication scheme in cloud storage
    Wang, Liang
    Wang, Baocang
    Song, Wei
    Zhang, Zhili
    [J]. INFORMATION SCIENCES, 2019, 504 : 48 - 60
  • [48] RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage
    Mishra, Shivansh
    Singh, Surjit
    Ali, Syed Taqi
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [49] Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT
    Nesa, Nashreen
    Banerjee, Indrajit
    [J]. TRANSACTIONS ON COMPUTATIONAL SCIENCE XXXV: SPECIAL ISSUE ON SIGNAL PROCESSING AND SECURITY IN DISTRIBUTED SYSTEMS, 2020, 11960 : 85 - 105
  • [50] An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage
    Su, Haonan
    Zheng, Dong
    Zhang, Yinghui
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 833 - 836