Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud

被引:1
|
作者
Song, Mingyang [1 ]
Hua, Zhongyun [1 ,2 ]
Zheng, Yifeng [1 ]
Xiang, Tao [3 ]
Jia, Xiaohua [1 ,4 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Guangdong, Peoples R China
[2] Guangdong Prov Key Lab Novel Secur Intelligence Te, Shenzhen 518000, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Hong Kong 518057, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Batch auditing; cloud storage security; integrity auditing; secure data deduplication; transparent deduplication; SIDE CHANNELS; INTEGRITY; SCHEME; FILE;
D O I
10.1109/TDSC.2023.3334475
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage systems, secure deduplication plays a critical role in saving storage costs for the cloud server and ensuring data confidentiality for cloud users. Traditional secure deduplication schemes require users to encrypt their outsourced files using specific encryption algorithms that cannot provide semantic security. However, users are unable to directly benefit from the storage savings, as the relation between the actual storage cost and the offered prices remains not transparent. As a result, users may be unwilling to cooperate with the cloud by encrypting their data using semantically secure algorithms. Moreover, data integrity is a significant concern for cloud storage users. To address these issues, this paper proposes a novel transparent and secure deduplication scheme that supports integrity auditing. Compared to previous works, our design can verify the number of file owners and the integrity through one-time proof verification. It also protects the private contents of files and the privacy of file ownership from malicious users. Moreover, our scheme includes a batch auditing method to simultaneously verify the numbers of file owners and the integrity of multiple files. Theoretical analysis confirms the correctness and security of our scheme. Comparison results demonstrate its competing performance over previous solutions.
引用
收藏
页码:3545 / 3561
页数:17
相关论文
共 50 条
  • [31] One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage
    Liu, Xuefeng
    Sun, Wenhai
    Lou, Wenjing
    Pei, Qingqi
    Zhang, Yuqing
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [32] A secure privacy-preserving cloud auditing scheme with data deduplication
    Li, Chen
    Liu, Zhenhua
    International Journal of Network Security, 2019, 21 (02) : 199 - 210
  • [33] STLDAS: Secure Two Level Deduplication and Auditing of Shared Data in Cloud
    Geeta, C. M.
    Lakshmi, Mithila G.
    Raju, Shreyas R. G.
    Raghavendra, S.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    PROCEEDINGS OF 2019 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2019, : 698 - 703
  • [34] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [35] Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach
    Mishra, Rahul
    Ramesh, Dharavath
    Kanhere, Salil S.
    Edla, Damodar Reddy
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2023, 14 (03)
  • [36] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [37] Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data
    Gao, Xiang
    Yu, Jia
    Chang, Yan
    Wang, Huaqun
    Fan, Jianxi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3774 - 3789
  • [38] Improved cloud storage auditing scheme with deduplication
    Zhang, Jindan
    Ogiela, Urszula
    Taniar, David
    Nedjah, Nadia
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (05) : 7905 - 7921
  • [39] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235
  • [40] Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms
    Youn, Taek-Young
    Jho, Nam-Su
    Kim, Keonwoo
    Chang, Ku-Young
    Park, Ki-Woong
    ENERGIES, 2020, 13 (11)