HEDup: Secure Deduplication with Homomorphic Encryption

被引:0
|
作者
Miguel, Rodel [1 ]
Aung, Khin Mi Mi [1 ]
Mediana [2 ]
机构
[1] ASTAR, Data Storage Inst, Data Ctr Technol Div, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
关键词
Data Deduplication; Homomorphic Encryption; Confidentiality; Cloud Storage; Key Server;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers ( CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest. However, deduplication that works on detecting identical data does not work well with encrypted data provided by conventional encryption. Encryption of the same data using different key ( by different subscribers) will result in different ciphertexts that will not allow the CSP to carry out deduplication. In this paper, we propose a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises, called HEDup ( Homomorphic Encryption Deduplication). In this solution, the subscriber encrypts data with data-encryption key obtained from key server via various key-management schemes, one of which uses homomorphic encryption. The main contributions of this project are ( 1) with a key server deployed at cloud provider premises, it will not only deduplicate data from particular domain but also for the CSP's entire client base including public and different enterprise users - this results in higher storage savings and ( 2) data owners still maintain exclusive control of their data and data-encryption keys, i.e. CSP has no access to any of it - strong confidentiality guarantees. The experiments conducted show that data uploads and downloads using HEDup have minor storage and latency overhead. Our implementation also shows significant performance optimization when compared to commercial key management service for cloud object storage.
引用
收藏
页码:215 / 223
页数:9
相关论文
共 50 条
  • [31] SoK: Towards CCA Secure Fully Homomorphic Encryption
    Okada, Hiroki
    Fukushima, Kazuhide
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 793 - 798
  • [32] Secure Relative Detection in (Forensic) Database with Homomorphic Encryption
    Chen, Jingwei
    Miao, Weijie
    Wu, Wenyuan
    Yang, Linhan
    Yuan, Haonan
    BIOINFORMATICS RESEARCH AND APPLICATIONS, PT II, ISBRA 2024, 2024, 14955 : 410 - 422
  • [33] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58
  • [34] Secure Multiple Linear Regression Based on Homomorphic Encryption
    Hall, Rob
    Fienberg, Stephen E.
    Nardi, Yuval
    JOURNAL OF OFFICIAL STATISTICS, 2011, 27 (04) : 669 - 691
  • [35] Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption
    Zhu, Lin
    Hua, Qiang-sheng
    Chen, Yi
    Jin, Hai
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 249 - 269
  • [36] Implementing homomorphic encryption based secure feedback control
    Tran, Julian
    Farokhi, Farhad
    Cantoni, Michael
    Shames, Iman
    CONTROL ENGINEERING PRACTICE, 2020, 97
  • [37] Optimizing Homomorphic Encryption based Secure Image Analytics
    Jain, Nayna
    Nandakumar, Karthik
    Ratha, Nalini
    Pankanti, Sharath
    Kumar, Uttam
    IEEE MMSP 2021: 2021 IEEE 23RD INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP), 2021,
  • [38] Scalable and Secure Logistic Regression via Homomorphic Encryption
    Aono, Yoshinori
    Hayashi, Takuya
    Le Trieu Phong
    Wang, Lihua
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 142 - 144
  • [39] Homomorphic Encryption for Secure Information Retrieval from the Cloud
    Anand, V.
    Satapathy, Suresh Chandra
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [40] Secure Similarity Joins Using Fully Homomorphic Encryption
    Cruz, Mateus S. H.
    Amagasa, Toshiyuki
    Watanabe, Chiemi
    Lu, Wenjie
    Kitagawa, Hiroyuki
    19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 224 - 233