Secure proof of storage with deduplication for cloud storage systems

被引:0
|
作者
Youngjoo Shin
Dongyoung Koo
Junbeom Hur
Joobeom Yun
机构
[1] The Affiliated Institute of ETRI,Department of Computer Science
[2] Korea Advanced Institute of Science and Technology (KAIST),Department of Computer Science and Engineering
[3] Korea University,Department of Computer and Information Security
[4] Sejong University,undefined
来源
关键词
Cloud computing; Multimedia content security; Cloud storage; Proof of data possession; Proof of retrievability; Proof of ownership; Data deduplication;
D O I
暂无
中图分类号
学科分类号
摘要
Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.
引用
收藏
页码:19363 / 19378
页数:15
相关论文
共 50 条
  • [1] Secure proof of storage with deduplication for cloud storage systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    Yun, Joobeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19363 - 19378
  • [2] Secure Deduplication on Public Cloud Storage
    Graupner, Hendrik
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Meinel, Christoph
    [J]. ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 34 - 41
  • [3] Proof of Storage for Video Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    [J]. 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 499 - 505
  • [4] Secure Image Deduplication in Cloud Storage
    Gang, Han
    Yan, Hongyang
    Xu, Lingling
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 243 - 251
  • [5] A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    [J]. ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [6] FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
    Jiang, Tao
    Yuan, Xu
    Chen, Yuan
    Cheng, Ke
    Wang, Liangmin
    Chen, Xiaofeng
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2466 - 2483
  • [7] Deduplication in cloud storage on the basis of proof of ownership
    Sirsat, Rupali Bhimrao
    Talhar, Nitin. R.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [8] Cloud Storage: A Review on Secure Deduplication and Issues
    Joice, S. Annie
    Mohamed, M. A. Maluk
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (03): : 861 - 873
  • [9] A Secure Hierarchical Deduplication System in Cloud Storage
    Yao, Xin
    Lin, Yaping
    Liu, Qin
    Zhang, Yanchao
    [J]. 2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [10] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118