Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage

被引:29
作者
Youn, Taek-Young [1 ]
Chang, Ku-Young [2 ]
Rhee, Kyung-Hyune [3 ]
Shin, Sang Uk [3 ]
机构
[1] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[2] Elect & Telecommun Res Inst, Cryptog Res Sect, Daejeon 34129, South Korea
[3] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan 48513, South Korea
关键词
Cloud storage; cryptography; data security; information security; public audit; secure deduplication; SECURE;
D O I
10.1109/ACCESS.2018.2836328
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, there is a considerable increase in the amount of data stored in storage services, along with dramatic evolution of networking techniques. In storage services with huge data, the storage servers may want to reduce the volume of stored data, and the clients may want to monitor the integrity of their data with a low cost, since the cost of the functions related to data storage increase in proportion to the size of the data. To achieve these goals, secure deduplication and integrity auditing delegation techniques have been studied, which can reduce the volume of data stored in storage by eliminating duplicated copies and permit clients to efficiently verify the integrity of stored files by delegating costly operations to a trusted party, respectively. So far many studies have been conducted on each topic, separately, whereas relatively few combined schemes, which support the two functions simultaneously, have been researched. In this paper, we design a combined technique, which performs both secure deduplication of encrypted data and public integrity auditing of data. To support the two functions, the proposed scheme performs challenge-response protocols using the BLS signature-based homomorphic linear authenticator. We utilize a third party auditor for performing public audit, in order to help low-powered clients. The proposed scheme satisfies all the fundamental security requirements. We also propose two variances that provide higher security and better performance.
引用
收藏
页码:26578 / 26587
页数:10
相关论文
共 18 条
[1]  
[Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
[2]  
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]  
Bellare M, 2013, P 22 USENIX C SEC, P179, DOI DOI 10.1109/MPRV.2013.43
[5]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[6]  
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
[7]  
Dworkin M., 2001, SP80038A NIST
[8]  
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[9]  
Gantz J., 2010, IDC925
[10]   Proofs of Ownership in Remote Storage Systems [J].
Halevi, Shai ;
Harnik, Danny ;
Pinkas, Benny ;
shulman-peleg, Alexandra .
PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, :491-500