An implementation for secure data deduplication on end-to-end encrypted documents

被引:0
|
作者
Jipianu, Tora-Mihnea [1 ]
Aciobanitei, Iulian [1 ]
机构
[1] Mil Tech Acad Ferdinand I, Fac Informat Syst & Cyber Secur, Bucharest, Romania
关键词
Data Deduplication; Merkle Hash Tree; Merkle Tree; Proof of Ownership;
D O I
10.1109/SACI60582.2024.10619071
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the realm of data storage and management, secure data deduplication represents a cornerstone technology for optimizing storage space and reducing redundancy. Traditional client-side deduplication approaches, while efficient regarding storage and network traffic, expose vulnerabilities that allow malicious users to infer the existence of specific files through traffic analysis. Even using a Proof of ownership scheme does not guarantee protection from all attack scenarios, specific to data deduplication. This paper introduces a novel secure data deduplication framework employing a deduplication proxy that operates onpremise, effectively mitigating the risk of such inference attacks. By leveraging convergent encryption, and Merkle tree challenges for proof of ownership, our solution ensures that data deduplication does not compromise data privacy or security. The deduplication proxy acts as an intermediary, performing deduplication processes on-premise. This approach not only preserves the efficiency benefits of deduplication but also enhances security by preventing external visibility into data traffic patterns. Our implementation, publicly available on Github, demonstrates the efficacy of the method for enforcing end-to-end encryption while maintaining data deduplication's storage-saving advantages. The proposed framework is suitable for organizations aiming to safeguard their data while optimizing storage resources.
引用
收藏
页码:303 / 307
页数:5
相关论文
共 50 条
  • [1] End-to-end data deduplication for the mobile Web
    Filipe, Ricardo
    Barreto, Joao
    2011 10TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2011,
  • [2] SEEMless: Secure End-to-End Encrypted Messaging with less Trust
    Chase, Melissa
    Deshpande, Apoorvaa
    Ghosh, Esha
    Malvai, Harjasleen
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1639 - 1656
  • [3] A Case for End-to-End Deduplication
    Douglis, Fred
    PROCEEDINGS OF 2016 FOURTH IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES (HOTWEB), 2016, : 7 - 13
  • [4] FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT
    Cui, Li
    Xing Qianqian
    Yi, Wang
    Wang Baosheng
    Jing, Tao
    Liu, Liu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [6] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [7] An End-to-End Secure Solution for IoMT Data Exchange
    El Jaouhari, Saad
    Tamani, Nouredine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 3 - 15
  • [8] MOZAIK: An End-to-End Secure Data Sharing Platform
    Abidin, Aysajan
    Marquet, Enzo
    Moeyersons, Jerico
    Limani, Xhulio
    Pohle, Erik
    Van Kenhove, Michiel
    Marquez-Barja, Johann M.
    Slamnik-Krijestorac, Nina
    Volckaert, Bruno
    PROCEEDINGS OF THE 2ND ACM DATA ECONOMY WORKSHOP, DEC 2023, 2023, : 34 - 40
  • [9] Secure end-to-end processing of smart metering data
    Andrey Brito
    Christof Fetzer
    Stefan Köpsell
    Peter Pietzuch
    Marcelo Pasin
    Pascal Felber
    Keiko Fonseca
    Marcelo Rosa
    Luiz Gomes
    Rodrigo Riella
    Charles Prado
    Luiz F. Rust
    Daniel E. Lucani
    Márton Sipos
    László Nagy
    Marcell Fehér
    Journal of Cloud Computing, 8
  • [10] Secure end-to-end processing of smart metering data
    Brito, Andrey
    Fetzer, Christof
    Koepsell, Stefan
    Pietzuch, Peter
    Pasin, Marcelo
    Felber, Pascal
    Fonseca, Keiko
    Rosa, Marcelo
    Gomes-Jr, Luiz
    Riella, Rodrigo
    Prado, Charles
    Rust, Luiz F.
    Lucani, Daniel E.
    Sipos, Marton
    Nagy, Laszlo
    Feher, Marcell
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2019, 8 (01):