HEDup: Secure Deduplication with Homomorphic Encryption

被引:0
|
作者
Miguel, Rodel [1 ]
Aung, Khin Mi Mi [1 ]
Mediana [2 ]
机构
[1] ASTAR, Data Storage Inst, Data Ctr Technol Div, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
关键词
Data Deduplication; Homomorphic Encryption; Confidentiality; Cloud Storage; Key Server;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers ( CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest. However, deduplication that works on detecting identical data does not work well with encrypted data provided by conventional encryption. Encryption of the same data using different key ( by different subscribers) will result in different ciphertexts that will not allow the CSP to carry out deduplication. In this paper, we propose a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises, called HEDup ( Homomorphic Encryption Deduplication). In this solution, the subscriber encrypts data with data-encryption key obtained from key server via various key-management schemes, one of which uses homomorphic encryption. The main contributions of this project are ( 1) with a key server deployed at cloud provider premises, it will not only deduplicate data from particular domain but also for the CSP's entire client base including public and different enterprise users - this results in higher storage savings and ( 2) data owners still maintain exclusive control of their data and data-encryption keys, i.e. CSP has no access to any of it - strong confidentiality guarantees. The experiments conducted show that data uploads and downloads using HEDup have minor storage and latency overhead. Our implementation also shows significant performance optimization when compared to commercial key management service for cloud object storage.
引用
收藏
页码:215 / 223
页数:9
相关论文
共 50 条
  • [1] Circular Secure Homomorphic Encryption Scheme
    Zhao X.
    Fu Y.
    Song W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2117 - 2124
  • [2] Secure Fingerprint Authentication with Homomorphic Encryption
    Yang, Wencheng
    Wang, Song
    Yu, Kan
    Kang, James Jin
    Johnstone, Michael N.
    2020 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2020,
  • [3] A Secure Processor Using Homomorphic Encryption
    Echandouri, Bouchra
    Gahi, Youssef
    Guennoun, Mouhcine
    Omary, Fouzia
    Networked Systems, NETYS 2016, 2016, 9944 : 376 - 376
  • [4] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [5] Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
  • [6] A hybrid encryption for secure data deduplication the cloud
    Ebinazer S.E.
    Savarimuthu N.
    Bhanu S.M.S.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 295 - 307
  • [7] Secure Sum Computation Using Homomorphic Encryption
    Sheikh, Rashid
    Mishra, Durgesh Kumar
    DATA SCIENCE AND BIG DATA ANALYTICS, 2019, 16 : 357 - 363
  • [8] Secure genotype imputation using homomorphic encryption
    Zhou, Junwei
    Lei, Botian
    Lang, Huile
    Panaousis, Emmanouil
    Liang, Kaitai
    Xiang, Jianwen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [9] On statistically-secure quantum homomorphic encryption
    Lai, Ching-Yi (cylai0616@gmail.com), 2018, Rinton Press Inc. (18): : 9 - 10
  • [10] Secure Multilayer Perceptron Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Genin, Emmanuelle
    Cozic, Michel
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 : 322 - 336