Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup

被引:0
|
作者
Sun, Wenhai [1 ]
Zhang, Ning [1 ]
Lou, Wenjing [1 ]
Hou, Y. Thomas [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We, in this work, investigate the problem of designing a secure chunk-based deduplication scheme in the enterprise backup storage setting. Most of the existing works focus on realizing file-level encrypted data deduplication or key/metadata management. Little attention is drawn to the practical chunk-level deduplication system. In particular, we identify that the information contained in a small-sized chunk is more susceptible to the brute-force attack compared with file-based deduplication. We propose a randomized oblivious key generation mechanism based on the inner workings of the backup service. In contrast with the current work that compromising one client will eventually expose all the clients' storage, our scheme offers a counter-intuitive property of achieving security against multiclient compromise with minimal deduplication performance loss. In addition, we enforce a per-backup rate-limiting policy to slow down the online brute-force attack. We show that the proposed scheme is provably secure in the malicious model. We also calibrate the system design by taking into account the practical deduplication requirements to accomplish a comparable plaintext deduplication performance. Our experiment on the real-world dataset shows its efficiency, effectiveness, and practicality.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Secure Deduplication of Encrypted Data: Refined Model and New Constructions
    Liu, Jian
    Duan, Li
    Li, Yong
    Asokan, N.
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 374 - 393
  • [32] Secure Data Deduplication with Reliable Data Deletion in Cloud
    Meng, Wenjuan
    Ge, Jianhua
    Jiang, Tao
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 551 - 570
  • [33] A hybrid encryption for secure data deduplication the cloud
    Ebinazer S.E.
    Savarimuthu N.
    Bhanu S.M.S.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 295 - 307
  • [34] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [35] VM-Centric Snapshot Deduplication for Cloud Data Backup
    Zhang, Wei
    Agun, Daniel
    Yang, Tao
    Wolski, Rich
    Tang, Hong
    2015 31ST SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST), 2015,
  • [36] Blockchain based secure medical data outsourcing with data deduplication in cloud environment
    Benil, T.
    Jasper, J.
    COMPUTER COMMUNICATIONS, 2023, 209 : 1 - 13
  • [37] AF-Dedup: Secure Encrypted Data Deduplication Based on Adaptive Dynamic Merkle Hash Forest PoW for Cloud Storage
    Guo, Xinyue
    Xian, Hequn
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (10) : 12294 - 12304
  • [38] Anonymous Deduplication of Encrypted Data with Proof of Ownership in Cloud Storage
    Jin, Xuexue
    Wei, Lingbo
    Yu, Mengke
    Yu, Nenghai
    Sun, Jinyuan
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 224 - 229
  • [39] Secure similarity-based cloud data deduplication in Ubiquitous city
    Liu, Jinfeng
    Wang, Jianfeng
    Tao, Xiaoling
    Shen, Jian
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 231 - 242
  • [40] Random chunks attachment strategy based secure deduplication for cloud data
    Genghao L.
    Ziji Z.
    Xin T.
    Yiteng Z.
    Yuqi Z.
    Tianyang Q.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (05): : 212 - 228