Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management

被引:3
作者
Lee, Mira [1 ]
Seo, Minhye [1 ]
机构
[1] Duksung Womens Univ, Dept Cyber Secur, Seoul 01369, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 24期
基金
新加坡国家研究基金会;
关键词
deduplication; cloud storage; data sharing; message-locked encryption; dynamic ownership update; SCHEME;
D O I
10.3390/app132413270
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This technology has the potential to save up to 90% of space by eliminating redundant data in cloud storage. The secure data sharing in cloud (SeDaSC) protocol is an efficient data-sharing solution supporting secure deduplication. In the SeDaSC protocol, a cryptographic server (CS) encrypts clients' data on behalf of clients to reduce their computational overhead, but this essentially requires complete trust in the CS. Moreover, the SeDaSC protocol does not consider data deduplication. To address these issues, we propose a secure deduplication protocol based on the SeDaSC protocol that minimizes the computational cost of clients while leveraging trust in the CS. Our protocol enhances data privacy and ensures computational efficiency for clients. Moreover, it dynamically manages client ownership, satisfying forward and backward secrecy.
引用
收藏
页数:22
相关论文
共 24 条
[1]  
Al-Amer A, 2021, INT J ADV COMPUT SC, V12, P916
[2]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[3]   Modified SeDaSc system for efficient data sharing in the cloud [J].
Areed, Marwa F. ;
Rashed, Mohamed M. ;
Fayez, Nehal ;
Abdelhay, Ehab H. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (21)
[4]  
Bellare Mihir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P179
[5]   Message-Locked Encryption and Secure Deduplication [J].
Bellare, Mihir ;
Keelveedhi, Sriram ;
Ristenpart, Thomas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 :296-312
[6]  
Blasco J, 2014, IEEE CONF COMM NETW, P481, DOI 10.1109/CNS.2014.6997518
[7]  
Di Pietro R, 2012, 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012)
[8]   Reclaiming space from duplicate files in a serverless distributed file system [J].
Douceur, JR ;
Adya, A ;
Bolosky, WJ ;
Simon, D ;
Theimer, M .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :617-624
[9]  
Dutch M., 2008, P SNIA DAT MAN FOR O, VVolume 7
[10]  
Greenan K., 2008, P 4 ACM INT WORKSHOP, P1