UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties

被引:1
作者
Wu, Shaoqiang [1 ,2 ]
Jia, Chunfu [1 ,2 ]
Wang, Ding [1 ,2 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[2] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022) | 2022年 / 648卷
基金
中国国家自然科学基金;
关键词
Deduplication; Message-locked encryption; Updatable; MERKLE-TREE;
D O I
10.1007/978-3-031-06975-8_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication is widely used to improve space efficiency in cloud storage. The Updatable block-level Message-Locked Encryption (UMLE) has been proposed to achieve efficient block-level updates for a deduplication system. However, the update design of the current UMLE instantiation adopts a static structure, which does not fit in with real update scenarios. This paper analyzes the File System and Storage Lab (FSL) Homes datasets that are widely used in deduplication research and reveals two interesting properties: i) Updated blocks are more likely to be updated again; ii) Updated blocks are always clustered in files. Based on these properties, we propose and implement an efficient and practical UMLE scheme. Experiments on real-world datasets show that our update algorithm is 24.85% more efficient than its foremost counterpart, increasing the space overhead by <= 0.39%.
引用
收藏
页码:251 / 269
页数:19
相关论文
共 23 条
  • [1] [Anonymous], 2014, FSL TRACES SNAPSHOTS
  • [2] [Anonymous], 2021, LINUX KERNEL ARCH
  • [3] Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    Ristenpart, Thomas
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
  • [4] BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2643 - 2652
  • [5] Reclaiming space from duplicate files in a serverless distributed file system
    Douceur, JR
    Adya, A
    Bolosky, WJ
    Simon, D
    Theimer, M
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 617 - 624
  • [6] Secure Logging Schemes and Certificate Transparency
    Dowling, Benjamin
    Guenther, Felix
    Herath, Udyani
    Stebila, Douglas
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 140 - 158
  • [7] Jingwei Li, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P618, DOI 10.1109/DSN.2016.62
  • [8] An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid
    Li, Hongwei
    Lu, Rongxing
    Zhou, Liang
    Yang, Bo
    Shen, Xuemin
    [J]. IEEE SYSTEMS JOURNAL, 2014, 8 (02): : 655 - 663
  • [9] Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection
    Li, Jingwei
    Lee, Patrick P. C.
    Ren, Yanjing
    Zhang, Xiaosong
    [J]. 2019 35TH SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST 2019), 2019, : 269 - 281
  • [10] Li M., 2015, 2015 USENIX ANN TECH, P111