A secure privacy preserving deduplication scheme for cloud computing

被引:23
|
作者
Fan, Yongkai [1 ,2 ]
Lin, Xiaodong [2 ]
Liang, Wei [3 ]
Tan, Gang [4 ]
Nanda, Priyadarsi [5 ]
机构
[1] Chifeng Univ, Dept Comp Sci & Technol, Chifeng, Peoples R China
[2] China Univ Petr, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Hunan Univ, Trusted Comp & Network Prov Key Lab, Changsha, Hunan, Peoples R China
[4] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[5] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
关键词
Deduplication; Trusted execution environment; Cloud storage; Encryption;
D O I
10.1016/j.future.2019.04.046
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs. Despite of the fact that the traditional deduplication approach has been adopted widely, it comes with a high risk of losing data confidentiality because of the data storage models in cloud computing. To deal with this issue in cloud storage, we first propose a TEE (trusted execution environment) based secure deduplication scheme. In our scheme, each cloud user is assigned a privilege set; the deduplication can be performed if and only if the cloud users have the correct privilege. Moreover, our scheme augments the convergent encryption with users' privileges and relies on TEE to provide secure key management, which improves the ability of such cryptosystem to resist chosen plaintext attacks and chosen ciphertext attacks. A security analysis indicates that our scheme is secure enough to support data deduplication and to protect the confidentiality of sensitive data. Furthermore, we implement a prototype of our scheme and evaluate the performance of our prototype, experiments show that the overhead of our scheme is practical in realistic environments. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 135
页数:9
相关论文
共 50 条
  • [31] A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
    Shen, Jian
    Yang, Huijie
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2198 - 2210
  • [32] A lightweight privacy and integrity preserving range query scheme for mobile cloud computing
    Xu, Zhou
    Lin, Yaping
    Sandor, Voundi Koe Arthur
    Huang, Zhisheng
    Liu, Xinbo
    COMPUTERS & SECURITY, 2019, 84 : 318 - 333
  • [33] Privacy Preserving Data Aggregation on Secure Cloud
    Komawar, Saket
    Batwal, Mayur
    Shah, Shubham
    Shahani, Snehkumar
    Abraham, Jibi
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [34] Efficient public integrity auditing with secure deduplication in cloud computing
    Huo, Huixia
    Jiang, Tao
    Tan, Shichong
    Tao, Xiaoling
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 764 - 777
  • [35] High Efficient Secure Data Deduplication Method for Cloud Computing
    Guo, Yongan
    Jiang, Chunlei
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 557 - 564
  • [36] Secure outsourced decryption for FHE-based privacy-preserving cloud computing
    Ma, Xirong
    Li, Chuan
    Hu, Yuchang
    Tao, Yunting
    Jiang, Yali
    Li, Yanbin
    Kong, Fanyu
    Ge, Chunpeng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 86
  • [37] Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing
    Fan, Kai
    Wang, Xin
    Suto, Katsuya
    Li, Hui
    Yang, Yintang
    IEEE NETWORK, 2018, 32 (03): : 52 - 57
  • [38] Secure Communication Scheme of VANET with Privacy Preserving
    Hwang, Ren-Junn
    Hsiao, Yu-Kai
    Liu, Yen-Fu
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 654 - 659
  • [39] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [40] A secure authorized deduplication scheme for cloud data based on blockchain
    Zhang, Guipeng
    Yang, Zhenguo
    Xie, Haoran
    Liu, Wenyin
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)