HEDup: Secure Deduplication with Homomorphic Encryption

被引:0
|
作者
Miguel, Rodel [1 ]
Aung, Khin Mi Mi [1 ]
Mediana [2 ]
机构
[1] ASTAR, Data Storage Inst, Data Ctr Technol Div, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
来源
PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS) | 2015年
关键词
Data Deduplication; Homomorphic Encryption; Confidentiality; Cloud Storage; Key Server;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers ( CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest. However, deduplication that works on detecting identical data does not work well with encrypted data provided by conventional encryption. Encryption of the same data using different key ( by different subscribers) will result in different ciphertexts that will not allow the CSP to carry out deduplication. In this paper, we propose a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises, called HEDup ( Homomorphic Encryption Deduplication). In this solution, the subscriber encrypts data with data-encryption key obtained from key server via various key-management schemes, one of which uses homomorphic encryption. The main contributions of this project are ( 1) with a key server deployed at cloud provider premises, it will not only deduplicate data from particular domain but also for the CSP's entire client base including public and different enterprise users - this results in higher storage savings and ( 2) data owners still maintain exclusive control of their data and data-encryption keys, i.e. CSP has no access to any of it - strong confidentiality guarantees. The experiments conducted show that data uploads and downloads using HEDup have minor storage and latency overhead. Our implementation also shows significant performance optimization when compared to commercial key management service for cloud object storage.
引用
收藏
页码:215 / 223
页数:9
相关论文
共 50 条
  • [31] Practical homomorphic encryption over the integers for secure computation in the cloud
    Dyer, James
    Dyer, Martin
    Xu, Jie
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 549 - 579
  • [32] Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption
    Stripelis, Dimitris
    Saleem, Hamza
    Ghai, Tanmay
    Dhinagar, Nikhil J.
    Gupta, Umang
    Anastasiou, Chrysovalantis
    Ver Steeg, Greg
    Ravi, Srivatsan
    Naveed, Muhammad
    Thompson, Paul M.
    Ambite, Jose Luis
    17TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION PROCESSING AND ANALYSIS, 2021, 12088
  • [33] Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
    Will, Mark A.
    Nicholson, Brandon
    Tiehuis, Marc
    Ko, Ryan K. L.
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 173 - 184
  • [34] Secure Centralized Kalman Filter for Network Environments by Homomorphic Encryption
    Ladan, Sadeghikhorami
    Akbar, Safavi Ali
    2021 7TH INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION AND AUTOMATION (ICCIA), 2021, : 183 - 187
  • [35] Faster Secure Data Mining via Distributed Homomorphic Encryption
    Li, Junyi
    Huang, Heng
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 2706 - 2714
  • [36] An intelligent homomorphic audio signal encryption algorithm for secure interacting
    Yingjie Hu
    Qiuyu Zhang
    Qiwen Zhang
    Yujiao Ba
    Multimedia Tools and Applications, 2024, 83 : 25675 - 25693
  • [37] Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics
    Gandhi, Bhomik M.
    Vaghadia, Shruti B.
    Kumhar, Malaram
    Gupta, Rajesh
    Jadav, Nilesh Kumar
    Bhatia, Jitendra
    Tanwar, Sudeep
    Alabdulatif, Abdulatif
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [38] An intelligent homomorphic audio signal encryption algorithm for secure interacting
    Hu, Yingjie
    Zhang, Qiuyu
    Zhang, Qiwen
    Ba, Yujiao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25675 - 25693
  • [39] Practical homomorphic encryption over the integers for secure computation in the cloud
    James Dyer
    Martin Dyer
    Jie Xu
    International Journal of Information Security, 2019, 18 : 549 - 579
  • [40] Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
    Kim, Miran
    Song, Yongsoo
    Wang, Shuang
    Xia, Yuhou
    Jiang, Xiaoqian
    JMIR MEDICAL INFORMATICS, 2018, 6 (02) : 245 - 255