Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage

被引:24
|
作者
Youn, Taek-Young [1 ]
Chang, Ku-Young [2 ]
Rhee, Kyung-Hyune [3 ]
Shin, Sang Uk [3 ]
机构
[1] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[2] Elect & Telecommun Res Inst, Cryptog Res Sect, Daejeon 34129, South Korea
[3] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan 48513, South Korea
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cloud storage; cryptography; data security; information security; public audit; secure deduplication; SECURE;
D O I
10.1109/ACCESS.2018.2836328
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, there is a considerable increase in the amount of data stored in storage services, along with dramatic evolution of networking techniques. In storage services with huge data, the storage servers may want to reduce the volume of stored data, and the clients may want to monitor the integrity of their data with a low cost, since the cost of the functions related to data storage increase in proportion to the size of the data. To achieve these goals, secure deduplication and integrity auditing delegation techniques have been studied, which can reduce the volume of data stored in storage by eliminating duplicated copies and permit clients to efficiently verify the integrity of stored files by delegating costly operations to a trusted party, respectively. So far many studies have been conducted on each topic, separately, whereas relatively few combined schemes, which support the two functions simultaneously, have been researched. In this paper, we design a combined technique, which performs both secure deduplication of encrypted data and public integrity auditing of data. To support the two functions, the proposed scheme performs challenge-response protocols using the BLS signature-based homomorphic linear authenticator. We utilize a third party auditor for performing public audit, in order to help low-powered clients. The proposed scheme satisfies all the fundamental security requirements. We also propose two variances that provide higher security and better performance.
引用
收藏
页码:26578 / 26587
页数:10
相关论文
共 50 条
  • [21] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235
  • [22] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [23] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Bai, Jianli
    Yu, Jia
    Gao, Xiang
    SOFT COMPUTING, 2020, 24 (16) : 12197 - 12214
  • [24] Secure Client-Side Deduplication Scheme for Cloud with Dual Trusted Execution Environment
    Verma, Garima
    IETE JOURNAL OF RESEARCH, 2023, 69 (10) : 7015 - 7025
  • [25] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Jianli Bai
    Jia Yu
    Xiang Gao
    Soft Computing, 2020, 24 : 12197 - 12214
  • [26] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [27] Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Huang, Hejiao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4928 - 4945
  • [28] Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage
    Li, Shanshan
    Xu, Chunxiang
    Zhang, Yuan
    Du, Yicong
    Chen, Kefei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 134 - 146
  • [29] R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity
    Guo, Cheng
    Jiang, Xueru
    Choo, Kim-Kwang Raymond
    Jie, Yingmo
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 162
  • [30] Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
    Yuan, Jiawei
    Yu, Shucheng
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 145 - 153