Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud

被引:25
作者
Yang, Xue [1 ]
Lu, Rongxing [2 ]
Choo, Kim Kwang Raymond [3 ]
Yin, Fan [1 ]
Tang, Xiaohu [1 ]
机构
[1] Southwest Jiaotong Univ, Informat Secur & Natl Comp Grid Lab, Chengdu 610031, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
加拿大自然科学与工程研究理事会; 芬兰科学院; 美国国家科学基金会;
关键词
Secure data deduplication; big data; brute-force attacks; data availability; accountability;
D O I
10.1109/TBDATA.2017.2721444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure data deduplication can significantly reduce the communication and storage overheads in cloud storage services, and has potential applications in our big data-driven society. Existing data deduplication schemes are generally designed to either resist brute-force attacks or ensure the efficiency and data availability, but not both conditions. We are also not aware of any existing scheme that achieves accountability, in the sense of reducing duplicate information disclosure (e.g., to determine whether plaintexts of two encrypted messages are identical). In this paper, we investigate a three-tier cross-domain architecture, and propose an efficient and privacy-preserving big data deduplication in cloud storage (hereafter referred to as EPCDD). EPCDD achieves both privacy-preserving and data availability, and resists brute-force attacks. In addition, we take accountability into consideration to offer better privacy assurances than existing schemes. We then demonstrate that EPCDD outperforms existing competing schemes, in terms of computation, communication and storage overheads. In addition, the time complexity of duplicate search in EPCDD is logarithmic.
引用
收藏
页码:73 / 84
页数:12
相关论文
共 40 条
[1]  
Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
[2]  
[Anonymous], 2014, P 6 INT C NEW TECHNO
[3]  
[Anonymous], 1973, Sorting and Searching
[4]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]  
Bellare Mihir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P179
[6]   Message-Locked Encryption and Secure Deduplication [J].
Bellare, Mihir ;
Keelveedhi, Sriram ;
Ristenpart, Thomas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 :296-312
[7]  
Bhaskar R., 2013, P 20 ANN NETW DISTR
[8]  
Biggar H., 2007, EXPERIENCING DATA DE, DOI [10.1177/000944550704300309, DOI 10.1177/000944550704300309]
[9]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[10]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535