Secure proof of storage with deduplication for cloud storage systems

被引:9
作者
Shin, Youngjoo [1 ]
Koo, Dongyoung [2 ]
Hur, Junbeom [3 ]
Yun, Joobeom [4 ]
机构
[1] ETRI, Affiliated Inst, Daejeon, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Comp Sci, Daedeok Innopolis, South Korea
[3] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud computing; Multimedia content security; Cloud storage; Proof of data possession; Proof of retrievability; Proof of ownership; Data deduplication; RETRIEVABILITY;
D O I
10.1007/s11042-015-2956-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.
引用
收藏
页码:19363 / 19378
页数:16
相关论文
共 27 条
  • [1] [Anonymous], 2012, CISCO VISUAL NETWORK
  • [2] Ateniese G., 2008, P 4 INT C SEC PRIV C, P9
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] Blasco J, 2014, IEEE CONF COMM NETW, P481, DOI 10.1109/CNS.2014.6997518
  • [5] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [6] Bowers KevinD., 2009, Proc. of ACM-CCSW '09, P43, DOI DOI 10.1145/1655008.1655015
  • [7] Proof of retrievability with public verifiability resilient against related-key attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    [J]. IET INFORMATION SECURITY, 2015, 9 (01) : 43 - 49
  • [8] Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
  • [9] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [10] An efficient confidentiality-preserving Proof of Ownership for deduplication
    Gonzalez-Manzano, Lorena
    Orfila, Agustin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 50 : 49 - 59