SecDedup: Secure data deduplication with dynamic auditing in the cloud

被引:12
|
作者
Peng, Li [1 ]
Yan, Zheng [1 ]
Liang, Xueqin [1 ]
Yu, Xixun [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted deduplication; Auditing; Dynamic updating; Data ownership; Attack resistance; INTEGRITY;
D O I
10.1016/j.ins.2023.119279
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of big data, data explosion has brought challenges to cloud storage management. To improve cloud storage efficiency and save network communication bandwidth, cloud data deduplication has emerged as a research hotspot, especially in the field of encrypted cloud data storage. How to enhance the security of encrypted data deduplication by resisting various attacks on deduplication has become an important research issue. However, existing solutions suffer from security flaws and are vulnerable to a series of attacks, e.g., duplicate faking attacks, file ownership spoofing attacks, and file tampering attacks. Besides, dynamic data operation is rarely considered or audited. To solve the above problems, we propose a novel scheme, named SecDedup, to enhance the security of encrypted cloud data deduplication with dynamic auditing. SecDedup applies a homomorphic authenticator and designs a multi-functional data tag with optimized storage to support deduplication and auditing at the same time with security guarantee against various attacks as mentioned above. In particular, We embed multi-set hash functions into data tags to achieve dynamic data auditing. In addition, SecDedup supports batch auditing with optimized computational cost for multiple deduplication auditing tasks. We formally prove the correctness and security of SecDedup, showing that it can successfully achieve our design goals for resisting the above listed attacks. We also analyze and evaluate the performance of SecDedup in terms of computation, communication, and tag storage overheads by comparing them with existing works. The results show its effectiveness and scalability.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543
  • [42] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470
  • [43] Secure and Efficient Cloud Data Deduplication with Ownership Management
    Jiang, Shunrong
    Jiang, Tao
    Wang, Liangmin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1152 - 1165
  • [44] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [45] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [46] Provably-Secure Public Auditing with Deduplication
    Kim, Dongmin
    Jeong, Ik Rae
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2219 - 2236
  • [47] Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
    Lee, Mira
    Seo, Minhye
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [48] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [49] Secure Data Deduplication System with Tag Consistency in Cloud Data Storage
    Patil, Pramod Gorakh
    Dixit, Aditya Rajesh
    Sharma, Aman
    Mahale, Prashant Rajendra
    Jadhav, Mayur Pundlik
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 119 - 124
  • [50] To Develop Secure Deduplication of Data Using Hybrid Cloud Methodology
    Motegaonkar, Sonali B.
    Kulkarni, Chaitanya S.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1759 - 1762