Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup

被引:0
|
作者
Sun, Wenhai [1 ]
Zhang, Ning [1 ]
Lou, Wenjing [1 ]
Hou, Y. Thomas [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We, in this work, investigate the problem of designing a secure chunk-based deduplication scheme in the enterprise backup storage setting. Most of the existing works focus on realizing file-level encrypted data deduplication or key/metadata management. Little attention is drawn to the practical chunk-level deduplication system. In particular, we identify that the information contained in a small-sized chunk is more susceptible to the brute-force attack compared with file-based deduplication. We propose a randomized oblivious key generation mechanism based on the inner workings of the backup service. In contrast with the current work that compromising one client will eventually expose all the clients' storage, our scheme offers a counter-intuitive property of achieving security against multiclient compromise with minimal deduplication performance loss. In addition, we enforce a per-backup rate-limiting policy to slow down the online brute-force attack. We show that the proposed scheme is provably secure in the malicious model. We also calibrate the system design by taking into account the practical deduplication requirements to accomplish a comparable plaintext deduplication performance. Our experiment on the real-world dataset shows its efficiency, effectiveness, and practicality.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities
    Yang, Chao
    Zhang, Mingyue
    Jiang, Qi
    Zhang, Junwei
    Li, Danping
    Ma, Jianfeng
    Ren, Jian
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 243 - 258
  • [42] An implementation for secure data deduplication on end-to-end encrypted documents
    Jipianu, Tora-Mihnea
    Aciobanitei, Iulian
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 303 - 307
  • [43] SecDedup: Secure data deduplication with dynamic auditing in the cloud
    Peng, Li
    Yan, Zheng
    Liang, Xueqin
    Yu, Xixun
    INFORMATION SCIENCES, 2023, 644
  • [44] Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud
    Dinesh, N.
    Juvanna, I.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 305 - 313
  • [45] DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
    Ghassabi, Kiana
    Pahlevani, Peyman
    IEEE ACCESS, 2024, 12 : 70743 - 70758
  • [46] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543
  • [47] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [48] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470
  • [49] Secure and Efficient Cloud Data Deduplication with Ownership Management
    Jiang, Shunrong
    Jiang, Tao
    Wang, Liangmin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1152 - 1165
  • [50] Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
    Liu, Xueyan
    Lu, Tingting
    He, Xiaomei
    Yang, Xiaotao
    Niu, Shufen
    IEEE ACCESS, 2020, 8 (08): : 52062 - 52074