AF-Dedup: Secure Encrypted Data Deduplication Based on Adaptive Dynamic Merkle Hash Forest PoW for Cloud Storage

被引:0
作者
Guo, Xinyue [1 ]
Xian, Hequn [1 ,2 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266000, Peoples R China
[2] Cryptog & Cyberspace Secur Whampoa Inst, Guangzhou 510000, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Encryption; Servers; Cloud computing; Forestry; Informatics; Dictionaries; Adaptive dynamic Merkle hash forest (ADMHF); bilinear mapping; encrypted data deduplication (AF-Dedup); proof of ownership (PoW); SCHEME; KEY;
D O I
10.1109/TII.2024.3417327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For encrypted data deduplication, proof of ownership (PoW) verifies a client's ownership of an entire file, preventing malicious users from exploiting a single segment of information to gain access to the file. By establishing the identity of two users who possess the same file, cloud service provider (CSP) can maintain a single copy for the file, enabling deduplication. However, existing PoW schemes based on Merkle hash tree (MHT) cannot guarantee the security of small files. Therefore, we propose a novel data structure named adaptive dynamic Merkle hash forest (ADMHF) for PoW, and present an encrypted data deduplication scheme called AF-Dedup. It reduces the risks of data content exposure resulting from multiple ownership verification attempts in traditional schemes. Specifically, we first construct the file tag as a unique identifier of the file. Second, different encryption schemes are employed depending on the popularity of the data. Then, the corresponding ADMHF is generated for subsequent ownership verifications. After security analysis and simulation experiments, our scheme is proven to significantly enhance the security of small files. In a given situation for files with only two blocks, our scheme achieves the same level of security as the existing scheme for a file with 91 blocks.
引用
收藏
页码:12294 / 12304
页数:11
相关论文
共 26 条
  • [1] Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    Ristenpart, Thomas
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
  • [2] BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2643 - 2652
  • [3] SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage
    Dave, Jay
    Faruki, Parvez
    Laxmi, Vijay
    Zemmari, Akka
    Gaur, Manoj
    Conti, Mauro
    [J]. COMPUTER COMMUNICATIONS, 2020, 154 (154) : 148 - 159
  • [4] Reclaiming space from duplicate files in a serverless distributed file system
    Douceur, JR
    Adya, A
    Bolosky, WJ
    Simon, D
    Theimer, M
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 617 - 624
  • [5] A secure privacy preserving deduplication scheme for cloud computing
    Fan, Yongkai
    Lin, Xiaodong
    Liang, Wei
    Tan, Gang
    Nanda, Priyadarsi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 127 - 135
  • [6] Secure cloud storage with anonymous deduplication using ID-based key management
    Gharib, Mohammed
    Fazli, MohammadAmin
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (02) : 2356 - 2382
  • [7] R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity
    Guo, Cheng
    Jiang, Xueru
    Choo, Kim-Kwang Raymond
    Jie, Yingmo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 162
  • [8] Proofs of Ownership in Remote Storage Systems
    Halevi, Shai
    Harnik, Danny
    Pinkas, Benny
    shulman-peleg, Alexandra
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 491 - 500
  • [9] CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage
    Li, Shanshan
    Xu, Chunxiang
    Zhang, Yuan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 250 - 258
  • [10] Novel Android Malware Detection Method Based on Multi-dimensional Hybrid Features Extraction and Analysis
    Li, Yue
    Xu, Guangquan
    Xian, Hequn
    Rao, Longlong
    Shi, Jiangang
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (03) : 637 - 647