dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key

被引:4
作者
Chouhan, Vikas [1 ]
Peddoju, Sateesh K. [1 ]
Buyya, Rajkumar [2 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee, India
[2] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic 3010, Australia
关键词
Cloud security; Cloud storage; Convergent Encryption; Deduplication; DupLESS; Reliability; Erasure Coding; EFFICIENT;
D O I
10.1016/j.jisa.2022.103265
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Storage Providers generally maintain a single copy of the identical data received from multiple sources to optimize the space. They cannot deduplicate the identical data when the clients upload the data in the encrypted form. To address this problem, recently, Duplicateless Encryption for Simple Storage (DupLESS) scheme is introduced in the literature. Besides, the data stored in the cloud is unreliable due to the possibility of data losses in remote storage environments. The DupLESS scheme, on the other hand, keeps both the key and the data on a single storage server, which is unreliable if that server goes down. In essence, the existing related works aim to handle either secure-deduplication or reliability limited to either key reliability or the data reliability. Hence, there is a need to develop a secure-deduplication mechanism that is not vulnerable to any malicious activity, semantically secures both data and key, and achieves the reliability. To address these problems, this paper proposes the dualDup framework that (a) optimizes the storage by eliminating the duplicate encrypted data from multiple users by extending DupLESS concept, and (b) securely distributes the data and key fragments to achieve the privacy and reliability using Erasure Coding scheme. The proposed approach is implemented in Python on the top of the Dropbox datacenter and corresponding results are reported. Experiments are conducted in a realistic environment. The results demonstrate that the proposed framework achieves reliability with an average storage overhead of 66.66% corresponding to the Reed-Solomon(3,2) codes. We validated through security analysis that the proposed framework is secure from insider and outsider adversaries. Moreover, dualDup framework provides all the aspects of deduplication, attack mitigation, key security and management, reliability, and QoS features as compared to other state-of-the-art deduplication techniques.
引用
收藏
页数:16
相关论文
共 35 条
[1]  
Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
[2]  
AES, 2001, 197 AES FIPS, P197
[3]   Multi-Tenancy in Cloud Computing [J].
AlJahdali, Hussain ;
Albatli, Abdulaziz ;
Garraghan, Peter ;
Townend, Paul ;
Lau, Lydia ;
Xu, Jie .
2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, :344-351
[4]  
[Anonymous], 2015, SECURE HASH STANDARD
[5]  
Bellare Mihir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P179
[6]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[7]   Message-Locked Encryption and Secure Deduplication [J].
Bellare, Mihir ;
Keelveedhi, Sriram ;
Ristenpart, Thomas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 :296-312
[8]  
Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
[9]   Multiple ramp schemes [J].
De Santis, A ;
Masucci, B .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (05) :1720-1728
[10]   Reclaiming space from duplicate files in a serverless distributed file system [J].
Douceur, JR ;
Adya, A ;
Bolosky, WJ ;
Simon, D ;
Theimer, M .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :617-624