Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud

被引:1
|
作者
Song, Mingyang [1 ]
Hua, Zhongyun [1 ,2 ]
Zheng, Yifeng [1 ]
Xiang, Tao [3 ]
Jia, Xiaohua [1 ,4 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Guangdong, Peoples R China
[2] Guangdong Prov Key Lab Novel Secur Intelligence Te, Shenzhen 518000, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Hong Kong 518057, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Batch auditing; cloud storage security; integrity auditing; secure data deduplication; transparent deduplication; SIDE CHANNELS; INTEGRITY; SCHEME; FILE;
D O I
10.1109/TDSC.2023.3334475
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud storage systems, secure deduplication plays a critical role in saving storage costs for the cloud server and ensuring data confidentiality for cloud users. Traditional secure deduplication schemes require users to encrypt their outsourced files using specific encryption algorithms that cannot provide semantic security. However, users are unable to directly benefit from the storage savings, as the relation between the actual storage cost and the offered prices remains not transparent. As a result, users may be unwilling to cooperate with the cloud by encrypting their data using semantically secure algorithms. Moreover, data integrity is a significant concern for cloud storage users. To address these issues, this paper proposes a novel transparent and secure deduplication scheme that supports integrity auditing. Compared to previous works, our design can verify the number of file owners and the integrity through one-time proof verification. It also protects the private contents of files and the privacy of file ownership from malicious users. Moreover, our scheme includes a batch auditing method to simultaneously verify the numbers of file owners and the integrity of multiple files. Theoretical analysis confirms the correctness and security of our scheme. Comparison results demonstrate its competing performance over previous solutions.
引用
收藏
页码:3545 / 3561
页数:17
相关论文
共 50 条
  • [21] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [22] SecDedup: Secure data deduplication with dynamic auditing in the cloud
    Peng, Li
    Yan, Zheng
    Liang, Xueqin
    Yu, Xixun
    INFORMATION SCIENCES, 2023, 644
  • [23] Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud
    Dinesh, N.
    Juvanna, I.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 305 - 313
  • [24] Key-exposure resilient integrity auditing scheme with encrypted data deduplication
    Zhang X.
    Li C.
    Liu Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 95 - 106
  • [25] Anonymous Deduplication of Encrypted Data with Proof of Ownership in Cloud Storage
    Jin, Xuexue
    Wei, Lingbo
    Yu, Mengke
    Yu, Nenghai
    Sun, Jinyuan
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 224 - 229
  • [26] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [27] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    Cluster Computing, 2024, 27 : 2203 - 2215
  • [28] Enabling Secure Deduplication in Encrypted Decentralized Storage
    Zhang, Bo
    Cui, Helei
    Chen, Yaxing
    Liu, Xiaoning
    Yu, Zhiwen
    Guo, Bin
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 459 - 475
  • [29] Secure and efficient cloud data deduplication supporting dynamic data public auditing
    Ma, Hua
    Han, Xiaoyu
    Peng, Ting
    Zhang, Linchao
    International Journal of Network Security, 2018, 20 (06) : 1074 - 1084
  • [30] Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory
    Liang, Xueqin
    Yan, Zheng
    Deng, Robert H.
    Zheng, Qinghua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 587 - 600