A secure privacy preserving deduplication scheme for cloud computing

被引:23
|
作者
Fan, Yongkai [1 ,2 ]
Lin, Xiaodong [2 ]
Liang, Wei [3 ]
Tan, Gang [4 ]
Nanda, Priyadarsi [5 ]
机构
[1] Chifeng Univ, Dept Comp Sci & Technol, Chifeng, Peoples R China
[2] China Univ Petr, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Hunan Univ, Trusted Comp & Network Prov Key Lab, Changsha, Hunan, Peoples R China
[4] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[5] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
关键词
Deduplication; Trusted execution environment; Cloud storage; Encryption;
D O I
10.1016/j.future.2019.04.046
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs. Despite of the fact that the traditional deduplication approach has been adopted widely, it comes with a high risk of losing data confidentiality because of the data storage models in cloud computing. To deal with this issue in cloud storage, we first propose a TEE (trusted execution environment) based secure deduplication scheme. In our scheme, each cloud user is assigned a privilege set; the deduplication can be performed if and only if the cloud users have the correct privilege. Moreover, our scheme augments the convergent encryption with users' privileges and relies on TEE to provide secure key management, which improves the ability of such cryptosystem to resist chosen plaintext attacks and chosen ciphertext attacks. A security analysis indicates that our scheme is secure enough to support data deduplication and to protect the confidentiality of sensitive data. Furthermore, we implement a prototype of our scheme and evaluate the performance of our prototype, experiments show that the overhead of our scheme is practical in realistic environments. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 135
页数:9
相关论文
共 50 条
  • [1] A secure privacy-preserving cloud auditing scheme with data deduplication
    Li, Chen
    Liu, Zhenhua
    International Journal of Network Security, 2019, 21 (02) : 199 - 210
  • [2] Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
    Huang, Qinlong
    Zhang, Zhicheng
    Yang, Yixian
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (05) : 1951 - 1964
  • [3] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [4] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    Huang, Qin-Long
    Ma, Zhao-Feng
    Yang, Yi-Xian
    Fu, Jing-Yi
    Niu, Xin-Xin
    Journal of China Universities of Posts and Telecommunications, 2013, 20 (06): : 88 - 95
  • [5] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    FU Jing-yi
    NIU Xin-xin
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2013, 20 (06) : 88 - 95
  • [6] A secure cloud storage system supporting privacy-preserving fuzzy deduplication
    Xuan Li
    Jin Li
    Faliang Huang
    Soft Computing, 2016, 20 : 1437 - 1448
  • [7] A secure cloud storage system supporting privacy-preserving fuzzy deduplication
    Li, Xuan
    Li, Jin
    Huang, Faliang
    SOFT COMPUTING, 2016, 20 (04) : 1437 - 1448
  • [8] A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing
    Ma, Xuewei
    Yang, Wenyuan
    Zhu, Yuesheng
    Bai, Zhiqiang
    2022 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, IPCCC, 2022,
  • [9] A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing
    Xia, Zhihua
    Wang, Lan
    Tang, Jian
    Xiong, Neal N.
    Weng, Jian
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 318 - 330
  • [10] Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wu, Yulin
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Peng
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 562 - 567