HEDup: Secure Deduplication with Homomorphic Encryption

被引:0
|
作者
Miguel, Rodel [1 ]
Aung, Khin Mi Mi [1 ]
Mediana [2 ]
机构
[1] ASTAR, Data Storage Inst, Data Ctr Technol Div, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
关键词
Data Deduplication; Homomorphic Encryption; Confidentiality; Cloud Storage; Key Server;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers ( CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest. However, deduplication that works on detecting identical data does not work well with encrypted data provided by conventional encryption. Encryption of the same data using different key ( by different subscribers) will result in different ciphertexts that will not allow the CSP to carry out deduplication. In this paper, we propose a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises, called HEDup ( Homomorphic Encryption Deduplication). In this solution, the subscriber encrypts data with data-encryption key obtained from key server via various key-management schemes, one of which uses homomorphic encryption. The main contributions of this project are ( 1) with a key server deployed at cloud provider premises, it will not only deduplicate data from particular domain but also for the CSP's entire client base including public and different enterprise users - this results in higher storage savings and ( 2) data owners still maintain exclusive control of their data and data-encryption keys, i.e. CSP has no access to any of it - strong confidentiality guarantees. The experiments conducted show that data uploads and downloads using HEDup have minor storage and latency overhead. Our implementation also shows significant performance optimization when compared to commercial key management service for cloud object storage.
引用
收藏
页码:215 / 223
页数:9
相关论文
共 50 条
  • [41] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [42] Application of a circular secure variant of LWE in the homomorphic encryption
    Yang, Xiaoyuan
    Zhou, Tanping
    Zhang, Wei
    Wu, Liqiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1389 - 1393
  • [43] Secure Control Using Homomorphic Encryption and Efficiency Analysis
    Pan J.
    Sui T.
    Liu W.
    Wang J.
    Kong L.
    Zhao Y.
    Security and Communication Networks, 2023, 2023
  • [44] Making cloud computing more secure: Homomorphic encryption
    Naone, Erica
    Technology Review, 2011, 114 (03) : 50 - 51
  • [45] Secure cloud computing based on threshold homomorphic encryption
    Varnovskiy, N. P.
    Martishin, S. A.
    Khrapchenko, M. V.
    Shokurov, A. V.
    PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (04) : 215 - 218
  • [46] Secure Face Matching Using Fully Homomorphic Encryption
    Boddeti, Vishnu Naresh
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [47] Secure cloud computing based on threshold homomorphic encryption
    N. P. Varnovskiy
    S. A. Martishin
    M. V. Khrapchenko
    A. V. Shokurov
    Programming and Computer Software, 2015, 41 : 215 - 218
  • [48] EFFICIENTLY SECURE MULTIPARTY COMPUTATION BASED ON HOMOMORPHIC ENCRYPTION
    Yao, Yuangang
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 343 - 349
  • [49] A Secure Cloud Computing Architecture Using Homomorphic Encryption
    Benzekki, Kamal
    El Fergougui, Abdeslam
    El Alaoui, Abdelbaki El Belrhiti
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 293 - 298
  • [50] Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption
    Aikata, Aikata
    Roy, Sujoy Sinha
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT I, 2025, 15495 : 51 - 74