Secure proof of storage with deduplication for cloud storage systems

被引:0
作者
Youngjoo Shin
Dongyoung Koo
Junbeom Hur
Joobeom Yun
机构
[1] The Affiliated Institute of ETRI,Department of Computer Science
[2] Korea Advanced Institute of Science and Technology (KAIST),Department of Computer Science and Engineering
[3] Korea University,Department of Computer and Information Security
[4] Sejong University,undefined
来源
Multimedia Tools and Applications | 2017年 / 76卷
关键词
Cloud computing; Multimedia content security; Cloud storage; Proof of data possession; Proof of retrievability; Proof of ownership; Data deduplication;
D O I
暂无
中图分类号
学科分类号
摘要
Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.
引用
收藏
页码:19363 / 19378
页数:15
相关论文
共 32 条
[1]  
Cui H(2014)Proof of retrievability with public verifiability resilient against related-key attacks IET Inf Secur 9 43-49
[2]  
Mu Y(2015)Dynamic provable data possession ACM Trans Inf Syst Secur 17 15:1-15:29
[3]  
Au MH(2010)Side channels in cloud services: deduplication in cloud storage IEEE Sec Privacy Mag 8 40-47
[4]  
Erway C(2014)Secure deduplication with efficient and reliable convergent key management IEEE Trans Parallel Distrib Syst 25 1615-1625
[5]  
Kupcu A(2015)A hybrid cloud approach for secure authorized deduplication IEEE Trans Parallel Distrib Syst 26 1206-1216
[6]  
Papamanthou C(2015)An efficient confidentiality-preserving proof of ownership for deduplication J Netw Comput Appl 50 49-59
[7]  
Tamassia R(2015)A survey and classification on storage deduplication systems ACM Comput Surv 47 11:1-11:30
[8]  
Harnik D(2007)Overview of the scalable video coding extension of the H. 264/AVC standard IEEE Trans Circ Syst Video Technol 17 1103-1120
[9]  
Pinkas B(2015)Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues ACM Comput Surv 47 65:1-65:34
[10]  
Shulman-Peleg A(undefined)undefined undefined undefined undefined-undefined