RESIST: Randomized Encryption for Deduplicated Cloud Storage System

被引:0
作者
Dave, Jay [1 ]
Hegde, Prithvi [1 ]
Desai, Hitaishi [1 ]
Kanodia, Anshul [1 ]
Srivastava, Raj [1 ]
Singh, Kushagra [1 ]
机构
[1] Birla Inst Technol & Sci Pilani, Dept Comp Sci & Informat Syst, Hyderabad Campus, Hyderabad 500078, Telangana, India
关键词
Cloud computing security; Deduplication; Randomized encryption; Dictionary attacks; SECURE; KEY;
D O I
10.1007/s13369-024-09658-3
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing offers scalable and ubiquitous storage services in a pay-as-you-go fashion. Data deduplication is one of the important technologies of cloud storage services. It reduces storage and communication costs by skipping uploading and storing redundant data copies. In order to protect data confidentiality, users generally encrypt data before uploading it to the cloud. Existing state-of-the-art deduplication security schemes either depend upon deterministic encryption mechanisms, that are exposed to online-offline dictionary attacks, or equip additional key server(s), which is not an economically efficient approach. In this paper, we propose a novel approach RESIST, randomized encryption for deduplicated cloud systems. RESIST encrypts the data using a random key to protect against online-offline dictionary attacks. In addition, the random key is encrypted using Merkle hash tree of data to limit its access to only data owners. Moreover, the previous data uploaders do not need to be online to share the key with subsequent uploaders. We analyze the security of RESIST using cryptographic proofs. We implement RESIST in real cloud environments and compare its performance with the recent state-of-the-art schemes.
引用
收藏
页数:21
相关论文
共 65 条
[1]  
[Anonymous], 2017, Pycryptodome-a self-contained python package
[2]   Spider Monkey Optimization algorithm for numerical optimization [J].
Bansal, Jagdish Chand ;
Sharma, Harish ;
Jadon, Shimpi Singh ;
Clerc, Maurice .
MEMETIC COMPUTING, 2014, 6 (01) :31-47
[3]  
Bellare M., 2013, Proceedings, V32, P296
[4]  
Biggar H, 2007, Experiencing data de-duplication: Improving efficiency and reducing capacity requirements
[5]  
Childs-Maidment J., 2017, Pyrebase-a simple python wrapper for the firebase api
[6]   dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key [J].
Chouhan, Vikas ;
Peddoju, Sateesh K. ;
Buyya, Rajkumar .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
[7]  
Confais B., 2020, Advances in Edge Computing: Massive Parallel Processing and Applications, V35, P61, DOI [10.3233/APC200004, DOI 10.3233/APC200004]
[8]  
Dave Jay, 2017, Information Systems Security. 13th International Conference, ICISS 2017. Proceedings: LNCS 10717, P164, DOI 10.1007/978-3-319-72598-7_10
[9]   SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage [J].
Dave, Jay ;
Faruki, Parvez ;
Laxmi, Vijay ;
Zemmari, Akka ;
Gaur, Manoj ;
Conti, Mauro .
COMPUTER COMMUNICATIONS, 2020, 154 :148-159
[10]  
Di Crescenzo G, 2006, LECT NOTES COMPUT SC, V3876, P225