A secure privacy preserving deduplication scheme for cloud computing

被引:23
作者
Fan, Yongkai [1 ,2 ]
Lin, Xiaodong [2 ]
Liang, Wei [3 ]
Tan, Gang [4 ]
Nanda, Priyadarsi [5 ]
机构
[1] Chifeng Univ, Dept Comp Sci & Technol, Chifeng, Peoples R China
[2] China Univ Petr, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Hunan Univ, Trusted Comp & Network Prov Key Lab, Changsha, Hunan, Peoples R China
[4] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[5] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 101卷
关键词
Deduplication; Trusted execution environment; Cloud storage; Encryption;
D O I
10.1016/j.future.2019.04.046
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs. Despite of the fact that the traditional deduplication approach has been adopted widely, it comes with a high risk of losing data confidentiality because of the data storage models in cloud computing. To deal with this issue in cloud storage, we first propose a TEE (trusted execution environment) based secure deduplication scheme. In our scheme, each cloud user is assigned a privilege set; the deduplication can be performed if and only if the cloud users have the correct privilege. Moreover, our scheme augments the convergent encryption with users' privileges and relies on TEE to provide secure key management, which improves the ability of such cryptosystem to resist chosen plaintext attacks and chosen ciphertext attacks. A security analysis indicates that our scheme is secure enough to support data deduplication and to protect the confidentiality of sensitive data. Furthermore, we implement a prototype of our scheme and evaluate the performance of our prototype, experiments show that the overhead of our scheme is practical in realistic environments. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 135
页数:9
相关论文
共 28 条
  • [1] Anderson P., 2010, INT C LARG INST SYST
  • [2] [Anonymous], 2014, SECURE DATA DEDUPLIC
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    [J]. JOURNAL OF CRYPTOLOGY, 2003, 16 (03) : 185 - 215
  • [5] Bellare M., 2013, ADV CRYPTOLOGY EUROC
  • [6] Camenisch J., 2007, SIMULATABLE ADAPTIVE
  • [7] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [8] Message-locked proof of ownership and retrievability with remote repairing in cloud
    Chen, Jing
    Zhang, Lihong
    He, Kun
    Chen, Min
    Du, Ruiying
    Wang, Lina
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3452 - 3466
  • [9] Douceur J.R., 2002, INT C DISTR COMP SYS
  • [10] Duan Y., 2014, DISTRIBUTED KEY GENE