An implementation for secure data deduplication on end-to-end encrypted documents

被引:0
|
作者
Jipianu, Tora-Mihnea [1 ]
Aciobanitei, Iulian [1 ]
机构
[1] Mil Tech Acad Ferdinand I, Fac Informat Syst & Cyber Secur, Bucharest, Romania
关键词
Data Deduplication; Merkle Hash Tree; Merkle Tree; Proof of Ownership;
D O I
10.1109/SACI60582.2024.10619071
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the realm of data storage and management, secure data deduplication represents a cornerstone technology for optimizing storage space and reducing redundancy. Traditional client-side deduplication approaches, while efficient regarding storage and network traffic, expose vulnerabilities that allow malicious users to infer the existence of specific files through traffic analysis. Even using a Proof of ownership scheme does not guarantee protection from all attack scenarios, specific to data deduplication. This paper introduces a novel secure data deduplication framework employing a deduplication proxy that operates onpremise, effectively mitigating the risk of such inference attacks. By leveraging convergent encryption, and Merkle tree challenges for proof of ownership, our solution ensures that data deduplication does not compromise data privacy or security. The deduplication proxy acts as an intermediary, performing deduplication processes on-premise. This approach not only preserves the efficiency benefits of deduplication but also enhances security by preventing external visibility into data traffic patterns. Our implementation, publicly available on Github, demonstrates the efficacy of the method for enforcing end-to-end encryption while maintaining data deduplication's storage-saving advantages. The proposed framework is suitable for organizations aiming to safeguard their data while optimizing storage resources.
引用
收藏
页码:303 / 307
页数:5
相关论文
共 50 条
  • [21] Secure Provisioning for Achieving End-to-End Secure Communications
    Sousa, Patricia R.
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507
  • [22] End-to-end Secure Insurance Telematics
    Salant, Eliot
    Gershinsky, Gidon
    SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2019, : 182 - 182
  • [23] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [24] Enhanced Certificate Transparency and End-to-end Encrypted Mail
    Ryan, Mark D.
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [25] Injection Attacks Against End-to-End Encrypted Applications
    Fabrega, Andres
    Perez, Carolina Ortega
    Namavari, Armin
    Nassi, Ben
    Agarwal, Rachit
    Ristenpart, Thomas
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2648 - 2665
  • [26] A Formal Treatment of End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Davis, Hannah
    Gunther, Felix
    Haller, Miro
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 40 - 74
  • [27] Cloud Challenge: Secure End-to-End Processing of Smart Metering Data
    Brito, Andrey
    Fetzer, Christof
    Kopsell, Stefan
    Pietzuch, Peter
    Pasin, Marcelo
    Felber, Pascal
    Fonseca, Keiko
    Rosa, Marcelo
    Gomes-, Luiz, Jr.
    Riella, Rodrigo
    Prado, Charles
    da Costa Carmo, Luiz F. C.
    Lucani, Daniel E.
    Sipos, Marton
    Nagy, Laszlo
    Feher, Marcell
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 36 - 42
  • [28] Voice End-to-End Encrypted for TETRA Radiocommunication System
    Buric, Marian
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422
  • [29] Snake: an End-to-End Encrypted Online Social Network
    Barenghi, Alessandro
    Beretta, Michele
    Di Federico, Alessandro
    Pelosi, Gerardo
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 763 - 770
  • [30] Using End-to-end Data Encryption to Secure SIP Device Configuration
    Chen, Xudong
    Fan, Wenjun
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 58 - 63