New method for file deduplication in cloud storage
Papers|更新时间:2024-06-05
|
New method for file deduplication in cloud storage
Journal on CommunicationsVol. 38, Issue 3, Pages: 25-33(2017)
作者机构:
1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
2. 西安邮电大学计算机学院,陕西 西安 710121
作者简介:
基金信息:
The National Natural Science Foundation of China(61672415);The National Natural Science Foundation of China(61671360);The National Natural Science Foundation of China(61672413);The Natural Science Project by Shaanxi Province Office of Education(14JK1665)
Chao YANG, Qian JI, Si-chun XIONG, et al. New method for file deduplication in cloud storage[J]. Journal on Communications, 2017, 38(3): 25-33.
DOI:
Chao YANG, Qian JI, Si-chun XIONG, et al. New method for file deduplication in cloud storage[J]. Journal on Communications, 2017, 38(3): 25-33. DOI: 10.11959/j.issn.1000-436x.2017057.
New method for file deduplication in cloud storage
Deduplication is widely used in cloud storage service to save bandwidth and storage resources
however
the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE
a deduplication solution of encrypting data for multi-client was first proposed
which could protect the privacy of data from the external attackers and honest but curious server
with favorable theoretical meaning and representativeness.However
in Xu-CDE
the user ownership authentication credentials were lack of instantaneity protection
which could not resist replay attack.As an improvement to the flaw
the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed
adding random number in order to ensure the instantaneity of the authentication credentials
and using the algorithm of MLE-K
P
to extract key from original file to replace the file itself as an encryption key.As a consequence
the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests
results show that based on Xu-CDE
the proposed protocol MRN-CDE has stronger security of ownership
and improves time efficiency.Specially
the new protocol works better on large files in
cloud with a certain value.
关键词
Keywords
references
BARACALDO N , ANDROULAKI E , GLIDER J , et al . Reconciling end-to-end confidentiality and data reduction in cloud storage [C ] // Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security . 2014 .
XIONG J B , LI F H , WANG Y C , et al . Research progress on cloud data assured deletion based on cryptography [J ] . Journal on Communi cations , 2016 , 37 ( 8 ): 167 - 184 .
HARNIK D , PINKAS B,SHULMAN-PELEG A . Side channels in cloud services,the case of deduplication in cloud storage [J ] . IEEE Security and Privacy , 2010 , 8 ( 6 ): 40 - 47 .
MULAZZANI M , SCHRITTWIESER S , LEITHNER M , et al . Dark clouds on the horizon:using cloud storage as attack vector and online slack space [C ] // USENIX Security Symposium . 2011 .
HALEVI S , HARNIK D , PINKAS B , et al . Proofs of ownership in remote storage systems [C ] // ACM Conference on Computer and Communications Security . 2011 : 491 - 500 .
ROBERTO D P , ALESSANDRO S . Boosting efficiency and security in proof of ownership for deduplication [C ] // ACM Symposium on Information,Computer and Communications Security . 2012 : 81 - 82 .
PIETRO D , ROBERTO , SORNIOTTI A . Proof of ownership for deduplication systems:a secure,scalable,and efficient solution [J ] . Computer Communications , 2016 , 82 ( 2 ): 71 - 82 .
DOUCEUR J , BOLOSKY W THEIMER M . US Patent 7266689:encryption systems and methods for identifying and coalescing identical objects encrypted with different keys [P ] . 2007 .
GONZÁLEZ-MANZANO L , ORFILA A . An efficient confidentiality-preserving proof of ownership for deduplication [J ] . Journal of Network and Computer Applications , 2015 , 50 ( 1 ): 49 - 59 .
XU J , CHANG E C , ZHOU J Y . Weak leakage-resilient client-side deduplication of encrypted data in cloud storage [C ] // The 8th ACM Symposium on Information,Computer and Communications Security . 2013 : 195 - 206 .
TANG H Y , CUI Y , GUAN C W , et al . Enabling ciphertext deduplication for secure cloud storage and access control [C ] // The 11th ACM on Asia Conference on Computer and Communications Security . 2016 : 59 - 70 .
BELLARE M , KEELVEEDHI S , RISTENPART T . Message-locked encryption and secure deduplication [C ] // Advances in CryptologyCRYPTO 2013,Lecture Notes in Computer Science . 2013 : 374 - 391 .
RASHID F , MIRI A , WOUNGANG I . Proof of retrieval and ownership protocols for enterprise-level data deduplication [C ] // The 2013 Conference of the Center for Advanced Studies on Collaborative Research . 2013 : 81 - 90 .