Skip to main content

Secure Encrypted Data Deduplication with Ownership Proof and User Revocation

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10393))

Abstract

Cloud storage as one of the most important cloud services enables cloud users to save more data without enlarging its own storage. In order to eliminate repeated data and improve the utilization of storage, deduplication is employed to cloud storage. Due to the concern about data security and user privacy, encryption is introduced, but incurs new challenge to cloud data deduplication. Existing work cannot achieve flexible access control and user revocation. Moreover, few of them can support efficient ownership proof, especially public verifiability of ownership. In this paper, we propose a secure encrypted data deduplication scheme with effective ownership proof and user revocation. We evaluate its performance and prove its security. The simulation results show that our scheme is efficient and effective for potential practical employment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7(4), 1–20 (2012)

    Article  Google Scholar 

  2. Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 99, 1–10 (2015)

    Google Scholar 

  3. Liu, C., Yang, C., Zhang, X.Y., Chen, J.J.: External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener. Comput. Syst. 49, 58–67 (2015)

    Article  Google Scholar 

  4. Puzio, P., Molva, R., Onen, M., Loureiro, S.: ClouDedup: secure deduplication with encrypted data for cloud storage. In: Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 363–370. IEEE (2013)

    Google Scholar 

  5. Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M.: Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proceedings of USENIX Security Symposium, p. 5 (2011)

    Google Scholar 

  6. Hur, J., Koo, D., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113–3125 (2016)

    Article  Google Scholar 

  7. Kwon, H., Hahn, C., Kim, D., Hur, J.: Secure deduplication for multimedia data with user revocation in cloud storage. Multimedia Tools Appl. 76(4), 5889–5903 (2017)

    Article  Google Scholar 

  8. Dropbox: A file-storage and sharing service. http://www.dropbox.com/

  9. Google Drive. http://drive.google.com

  10. Mozy, Mozy: a file-storage and sharing service. http://mozy.com/

  11. Sun, Z., Shen, J., Yong, J.M.: DeDu: building a deduplication storage system over cloud computing. In: IEEE International Conference on Computer Supported Cooperative Work in Design, pp. 348–355. IEEE (2014)

    Google Scholar 

  12. Wallace, G., Douglis, F., Qian, H.W., Shilane, P., Smaldone, S., Chamness, M., Hsu, W.: Characteristics of backup workloads in production systems. In: Proceedings of USENIX Conference on File and Storage Technologies, p. 500 (2012)

    Google Scholar 

  13. Wilcox, Z.O.: Convergent encryption reconsidered (2011). http://www.mail-archive.com/cryptography@metzdowd.com/msg08949.html

  14. Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server aided encryption for deduplicated storage. In: Proceedings of 22nd USENIX Conference on Security, pp. 179–194 (2013)

    Google Scholar 

  15. Wen, M., Ota, K., Li, H., Lei, J.S., Gu, C.H., Su, Z.: Secure data deduplication with reliable key management for dynamic updates in CPSS. IEEE Trans. Comput. Soc. Syst. 2(4), 137–147 (2015)

    Article  Google Scholar 

  16. Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 874–885. ACM (2015)

    Google Scholar 

  17. Yan, Z., Wang, M.J., Li, Y.X., Vasilakos, A.V.: Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput. 3(2), 28–35 (2016)

    Article  Google Scholar 

  18. Yan, Z., Ding, W., Zhu, H.: A scheme to manage encrypted data storage with deduplication in cloud. In: Wang, G., Zomaya, A., Perez, G.M., Li, K. (eds.) ICA3PP 2015. LNCS, vol. 9530, pp. 547–561. Springer, Cham (2015). doi:10.1007/978-3-319-27137-8_40

    Chapter  Google Scholar 

  19. Yan, Z., Ding, W.X., Yu, X.X., Zhu, H.Q., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2(2), 138–150 (2016)

    Article  Google Scholar 

  20. Liu, C., Liu, X., Wan, L.: Policy-based de-duplication in secure cloud storage. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 250–262. Springer, Heidelberg (2013). doi:10.1007/978-3-642-35795-4_32

    Chapter  Google Scholar 

  21. Lillibridge, M., Eshghi, K., Bhagwat, D.: Improving restore speed for backup systems that use inline chunk-based deduplication. In: Proceedings of USENIX Conference on File and Storae Technologies, pp. 183–198 (2013)

    Google Scholar 

  22. Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500. ACM (2011)

    Google Scholar 

  23. Pietro, R.D., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 81–82. ACM (2012)

    Google Scholar 

  24. Ng, W.K., Wen, Y., Zhu, H.: Private data deduplication protocols in cloud storage. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 441–446. ACM (2012)

    Google Scholar 

  25. Yang, C., Ren, J., Ma, J.F.: Provable ownership of file in de-duplication cloud storage. In: IEEE Global Communications Conference, pp. 695–700. IEEE (2013)

    Google Scholar 

  26. Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37–54. Springer, Heidelberg (2003). doi:10.1007/978-3-540-40061-5_3

    Chapter  Google Scholar 

Download references

Acknowledgment

This work is sponsored by the National Key Research and Development Program of China (grant 2016YFB0800700), the NSFC (grants 61672410 and U1536202), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), the 111 project (grants B08038 and B16037), and Academy of Finland (Grant No. 308087).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ding, W., Yan, Z., Deng, R.H. (2017). Secure Encrypted Data Deduplication with Ownership Proof and User Revocation. In: Ibrahim, S., Choo, KK., Yan, Z., Pedrycz, W. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2017. Lecture Notes in Computer Science(), vol 10393. Springer, Cham. https://doi.org/10.1007/978-3-319-65482-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65482-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65481-2

  • Online ISBN: 978-3-319-65482-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics