Secure and Efficient Data Deduplication in JointCloud Storage

被引:16
作者
Zhang, Di [1 ]
Le, Junqing [2 ]
Mu, Nankun [1 ]
Wu, Jiahui [2 ]
Liao, Xiaofeng [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Southwest Univ, Coll Elect & Informat Engn, Chongqing Key Lab Nonlinear Circuits & Intelligent, Chongqing 400715, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Servers; Data models; Computational modeling; Analytical models; Dynamic data; data sharing; single-point-of-failure; cloud storage; JointCloud; IDENTITY-BASED ENCRYPTION;
D O I
10.1109/TCC.2021.3081702
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication can efficiently eliminate data redundancies in cloud storage and reduce the bandwidth requirement of users. However, most previous schemes depending on the help of a trusted key server (KS) are vulnerable and limited because they suffer from revealing information, poor resistance to attacks, great computational overhead, etc. In particular, if the trusted KS fails, the whole system stops working, i.e., single-point-of-failure. In this article, we propose a Secure and Efficient data Deduplication scheme (named SED) in a JointCloud storage system which provides the global services via collaboration with various clouds. SED also supports dynamic data update and sharing without the help of the trusted KS. Moreover, SED can overcome the single-point-of-failure that commonly occurs in the classic cloud storage system. According to the theoretical analyses, our SED ensures the semantic security in the random oracle model and has strong anti-attack ability such as the brute-force attack resistance and the collusion attack resistance. Besides, SED can effectively eliminate data redundancies with low computational complexity and communication and storage overhead. The efficiency and functionality of SED improves the usability in client-side. Finally, the comparing results show that the performance of our scheme is superior to that of the existing schemes
引用
收藏
页码:156 / 167
页数:12
相关论文
共 50 条
  • [31] Secure deduplication for multimedia data with user revocation in cloud storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5889 - 5903
  • [32] BDO-SD: An Efficient Scheme for Big Data Outsourcing with Secure Deduplication
    Wen, Mi
    Lu, Kejie
    Lei, Jingsheng
    Li, Fengyong
    Li, Jing
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 214 - 219
  • [33] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [34] An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage
    Su, Haonan
    Zheng, Dong
    Zhang, Yinghui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 833 - 836
  • [35] High Efficient Secure Data Deduplication Method for Cloud Computing
    Guo, Yongan
    Jiang, Chunlei
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 557 - 564
  • [36] Secure deduplication for big data with efficient dynamic ownership updates
    Xu, Lu-Jun
    Hao, Rong
    Yu, Jia
    Vijayakumar, Pandi
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 96
  • [37] Survey on Data Deduplication in Cloud Storage Environments
    Kim, Won-Bin
    Lee, Im-Yeong
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (03): : 658 - 673
  • [38] Secure Data Deduplication and Efficient Storage Utilization in Cloud Servers Using Encryption, Compression and Integrity Auditing
    Nair, Arya S.
    Radhakrishnan, B.
    Jayakrishnan, R. P.
    Kanthan, Padma Suresh Lekshmi
    SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 326 - 334
  • [39] Efficient cross user Data Deduplication in Remote Data Storage
    Prajapati, Priteshkumar
    Shah, Parth
    2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [40] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Singh, Abhishek Kumar
    Alphonse, P. J. A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 102 - 120