HEDup: Secure Deduplication with Homomorphic Encryption

被引:0
|
作者
Miguel, Rodel [1 ]
Aung, Khin Mi Mi [1 ]
Mediana [2 ]
机构
[1] ASTAR, Data Storage Inst, Data Ctr Technol Div, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
关键词
Data Deduplication; Homomorphic Encryption; Confidentiality; Cloud Storage; Key Server;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers ( CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest. However, deduplication that works on detecting identical data does not work well with encrypted data provided by conventional encryption. Encryption of the same data using different key ( by different subscribers) will result in different ciphertexts that will not allow the CSP to carry out deduplication. In this paper, we propose a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises, called HEDup ( Homomorphic Encryption Deduplication). In this solution, the subscriber encrypts data with data-encryption key obtained from key server via various key-management schemes, one of which uses homomorphic encryption. The main contributions of this project are ( 1) with a key server deployed at cloud provider premises, it will not only deduplicate data from particular domain but also for the CSP's entire client base including public and different enterprise users - this results in higher storage savings and ( 2) data owners still maintain exclusive control of their data and data-encryption keys, i.e. CSP has no access to any of it - strong confidentiality guarantees. The experiments conducted show that data uploads and downloads using HEDup have minor storage and latency overhead. Our implementation also shows significant performance optimization when compared to commercial key management service for cloud object storage.
引用
收藏
页码:215 / 223
页数:9
相关论文
共 50 条
  • [21] A Secure Distributed Learning Framework Using Homomorphic Encryption
    Ly, Stephen
    Cheng, Yuan
    Chen, Haiquan
    Krovetz, Ted
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 258 - 266
  • [22] Secure Collapsing Method Based on Fully Homomorphic Encryption
    Niyitegeka, David
    Bellafqira, Reda
    Genin, Emmanuelle
    Coatrieux, Gouenou
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 412 - 416
  • [23] Homomorphic Encryption Based Secure Sensor Data Processing
    Gadepally, Vijay
    Isakov, Mihailo
    Agrawal, Rashmi
    Kepner, Jeremy
    Gettings, Karen
    Kinsy, Michel A.
    2020 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2020,
  • [24] Secure Decentralized Image Classification With Multiparty Homomorphic Encryption
    Xu, Guowen
    Li, Guanlin
    Guo, Shangwei
    Zhang, Tianwei
    Li, Hongwei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (07) : 3185 - 3198
  • [25] Secure Teleoperation Control Using Somewhat Homomorphic Encryption
    Kosieradzki, Shane
    Zhao, Xiaofeng
    Kawase, Hiroaki
    Qiu, Yingxin
    Kogiso, Kiminao
    Ueda, Jun
    IFAC PAPERSONLINE, 2022, 55 (37): : 593 - 600
  • [26] Challenges of Using Homomorphic Encryption to Secure Cloud Computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni Hssane, Abderrahim
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 343 - 349
  • [27] Secure Signal Processing Using Fully Homomorphic Encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, ACIVS 2015, 2015, 9386 : 93 - 104
  • [28] Performance of Secure Network Coding based on Homomorphic Encryption
    Choi, Seong-Min
    Park, Joon-Sang
    2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 670 - 672
  • [29] Secure signal processing using fully homomorphic encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    IET INFORMATION SECURITY, 2020, 14 (01) : 51 - 59
  • [30] Secure matrix multiplication based on fully homomorphic encryption
    Hai Huang
    Haoran Zong
    The Journal of Supercomputing, 2023, 79 : 5064 - 5085