A secure privacy preserving deduplication scheme for cloud computing

被引:23
|
作者
Fan, Yongkai [1 ,2 ]
Lin, Xiaodong [2 ]
Liang, Wei [3 ]
Tan, Gang [4 ]
Nanda, Priyadarsi [5 ]
机构
[1] Chifeng Univ, Dept Comp Sci & Technol, Chifeng, Peoples R China
[2] China Univ Petr, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Hunan Univ, Trusted Comp & Network Prov Key Lab, Changsha, Hunan, Peoples R China
[4] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[5] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
关键词
Deduplication; Trusted execution environment; Cloud storage; Encryption;
D O I
10.1016/j.future.2019.04.046
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs. Despite of the fact that the traditional deduplication approach has been adopted widely, it comes with a high risk of losing data confidentiality because of the data storage models in cloud computing. To deal with this issue in cloud storage, we first propose a TEE (trusted execution environment) based secure deduplication scheme. In our scheme, each cloud user is assigned a privilege set; the deduplication can be performed if and only if the cloud users have the correct privilege. Moreover, our scheme augments the convergent encryption with users' privileges and relies on TEE to provide secure key management, which improves the ability of such cryptosystem to resist chosen plaintext attacks and chosen ciphertext attacks. A security analysis indicates that our scheme is secure enough to support data deduplication and to protect the confidentiality of sensitive data. Furthermore, we implement a prototype of our scheme and evaluate the performance of our prototype, experiments show that the overhead of our scheme is practical in realistic environments. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 135
页数:9
相关论文
共 50 条
  • [21] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [22] A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
    Liu, Zewei
    Hu, Chunqiang
    Li, Ruinian
    Xiang, Tao
    Li, Xingwang
    Yu, Jiguo
    Xia, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2325 - 2336
  • [23] Privacy Preserving Approaches In Cloud Computing
    Karthiban, K.
    Smys, S.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 462 - 467
  • [24] Providing Privacy Preserving in Cloud Computing
    Wang, Jian
    Zhao, Yan
    Jiang, Shuo
    Le, Jiajin
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 472 - 475
  • [25] Privacy preserving in cloud computing environment
    Zou, Deqing
    Xiang, Yang
    Min, Geyong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2752 - 2753
  • [26] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [27] A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs
    Yang, Huijie
    Shen, Jian
    Zhou, Tianqi
    Ji, Sai
    Vijayakumar, Pandi
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (02)
  • [28] Survey on Secret Sharing Scheme with Deduplication in Cloud Computing
    Dharani, P.
    Berlin, M. A.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [29] A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing
    Wang, Xin
    Yang, Bo
    Xia, Zhe
    Zhao, Yanqi
    Yu, Huifang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [30] Linear Function based Transformation Scheme for Preserving Database Privacy in Cloud Computing
    Yoon, Min
    Kim, Hyeong-Il
    Jang, Miyoung
    Chang, Jae-Woo
    2013 19TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2013), 2013, : 498 - 503