Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud

被引:1
|
作者
Song, Mingyang [1 ]
Hua, Zhongyun [1 ,2 ]
Zheng, Yifeng [1 ]
Xiang, Tao [3 ]
Jia, Xiaohua [1 ,4 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Guangdong, Peoples R China
[2] Guangdong Prov Key Lab Novel Secur Intelligence Te, Shenzhen 518000, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Hong Kong 518057, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Batch auditing; cloud storage security; integrity auditing; secure data deduplication; transparent deduplication; SIDE CHANNELS; INTEGRITY; SCHEME; FILE;
D O I
10.1109/TDSC.2023.3334475
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage systems, secure deduplication plays a critical role in saving storage costs for the cloud server and ensuring data confidentiality for cloud users. Traditional secure deduplication schemes require users to encrypt their outsourced files using specific encryption algorithms that cannot provide semantic security. However, users are unable to directly benefit from the storage savings, as the relation between the actual storage cost and the offered prices remains not transparent. As a result, users may be unwilling to cooperate with the cloud by encrypting their data using semantically secure algorithms. Moreover, data integrity is a significant concern for cloud storage users. To address these issues, this paper proposes a novel transparent and secure deduplication scheme that supports integrity auditing. Compared to previous works, our design can verify the number of file owners and the integrity through one-time proof verification. It also protects the private contents of files and the privacy of file ownership from malicious users. Moreover, our scheme includes a batch auditing method to simultaneously verify the numbers of file owners and the integrity of multiple files. Theoretical analysis confirms the correctness and security of our scheme. Comparison results demonstrate its competing performance over previous solutions.
引用
收藏
页码:3545 / 3561
页数:17
相关论文
共 50 条
  • [41] Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers
    Zhang, Yuan
    Xu, Chunxiang
    Cheng, Nan
    Shen, Xuemin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [42] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [43] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [44] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Esther Daniel
    N. A. Vasanthi
    Cluster Computing, 2019, 22 : 1247 - 1258
  • [45] Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud
    El Ghazouani, Mohamed
    El Kiram, My Ahmed
    Er-Rajy, Latifa
    El Khanboubi, Yassine
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2020, 6 (03): : 32 - 38
  • [46] Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR
    Yu, Jingze
    Shen, Wenting
    Zhang, Xi
    COMPUTERS & SECURITY, 2024, 144
  • [47] Enabling Fast Public Auditing and Data Dynamics in Cloud Services
    Hahn, Changhee
    Kwon, Hyunsoo
    Kim, Daeyeong
    Hur, Junbeom
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2047 - 2059
  • [48] Toward Encrypted Cloud Media Center With Secure Deduplication
    Zheng, Yifeng
    Yuan, Xingliang
    Wang, Xinyu
    Jiang, Jinghua
    Wang, Cong
    Gui, Xiaolin
    IEEE TRANSACTIONS ON MULTIMEDIA, 2017, 19 (02) : 251 - 265
  • [49] An Encrypted File Deduplication Scheme with Permission in Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    Chen, Shuhong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [50] Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
    Sun, Wenhai
    Zhang, Ning
    Lou, Wenjing
    Hou, Y. Thomas
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,