Abstract
Cloud storage as one of the most important cloud services enables cloud users to save more data without enlarging its own storage. In order to eliminate repeated data and improve the utilization of storage, deduplication is employed to cloud storage. Due to the concern about data security and user privacy, encryption is introduced, but incurs new challenge to cloud data deduplication. Existing work cannot achieve flexible access control and user revocation. Moreover, few of them can support efficient ownership proof, especially public verifiability of ownership. In this paper, we propose a secure encrypted data deduplication scheme with effective ownership proof and user revocation. We evaluate its performance and prove its security. The simulation results show that our scheme is efficient and effective for potential practical employment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7(4), 1–20 (2012)
Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 99, 1–10 (2015)
Liu, C., Yang, C., Zhang, X.Y., Chen, J.J.: External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener. Comput. Syst. 49, 58–67 (2015)
Puzio, P., Molva, R., Onen, M., Loureiro, S.: ClouDedup: secure deduplication with encrypted data for cloud storage. In: Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 363–370. IEEE (2013)
Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M.: Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proceedings of USENIX Security Symposium, p. 5 (2011)
Hur, J., Koo, D., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113–3125 (2016)
Kwon, H., Hahn, C., Kim, D., Hur, J.: Secure deduplication for multimedia data with user revocation in cloud storage. Multimedia Tools Appl. 76(4), 5889–5903 (2017)
Dropbox: A file-storage and sharing service. http://www.dropbox.com/
Google Drive. http://drive.google.com
Mozy, Mozy: a file-storage and sharing service. http://mozy.com/
Sun, Z., Shen, J., Yong, J.M.: DeDu: building a deduplication storage system over cloud computing. In: IEEE International Conference on Computer Supported Cooperative Work in Design, pp. 348–355. IEEE (2014)
Wallace, G., Douglis, F., Qian, H.W., Shilane, P., Smaldone, S., Chamness, M., Hsu, W.: Characteristics of backup workloads in production systems. In: Proceedings of USENIX Conference on File and Storage Technologies, p. 500 (2012)
Wilcox, Z.O.: Convergent encryption reconsidered (2011). http://www.mail-archive.com/cryptography@metzdowd.com/msg08949.html
Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server aided encryption for deduplicated storage. In: Proceedings of 22nd USENIX Conference on Security, pp. 179–194 (2013)
Wen, M., Ota, K., Li, H., Lei, J.S., Gu, C.H., Su, Z.: Secure data deduplication with reliable key management for dynamic updates in CPSS. IEEE Trans. Comput. Soc. Syst. 2(4), 137–147 (2015)
Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 874–885. ACM (2015)
Yan, Z., Wang, M.J., Li, Y.X., Vasilakos, A.V.: Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput. 3(2), 28–35 (2016)
Yan, Z., Ding, W., Zhu, H.: A scheme to manage encrypted data storage with deduplication in cloud. In: Wang, G., Zomaya, A., Perez, G.M., Li, K. (eds.) ICA3PP 2015. LNCS, vol. 9530, pp. 547–561. Springer, Cham (2015). doi:10.1007/978-3-319-27137-8_40
Yan, Z., Ding, W.X., Yu, X.X., Zhu, H.Q., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2(2), 138–150 (2016)
Liu, C., Liu, X., Wan, L.: Policy-based de-duplication in secure cloud storage. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 250–262. Springer, Heidelberg (2013). doi:10.1007/978-3-642-35795-4_32
Lillibridge, M., Eshghi, K., Bhagwat, D.: Improving restore speed for backup systems that use inline chunk-based deduplication. In: Proceedings of USENIX Conference on File and Storae Technologies, pp. 183–198 (2013)
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500. ACM (2011)
Pietro, R.D., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 81–82. ACM (2012)
Ng, W.K., Wen, Y., Zhu, H.: Private data deduplication protocols in cloud storage. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 441–446. ACM (2012)
Yang, C., Ren, J., Ma, J.F.: Provable ownership of file in de-duplication cloud storage. In: IEEE Global Communications Conference, pp. 695–700. IEEE (2013)
Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37–54. Springer, Heidelberg (2003). doi:10.1007/978-3-540-40061-5_3
Acknowledgment
This work is sponsored by the National Key Research and Development Program of China (grant 2016YFB0800700), the NSFC (grants 61672410 and U1536202), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), the 111 project (grants B08038 and B16037), and Academy of Finland (Grant No. 308087).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ding, W., Yan, Z., Deng, R.H. (2017). Secure Encrypted Data Deduplication with Ownership Proof and User Revocation. In: Ibrahim, S., Choo, KK., Yan, Z., Pedrycz, W. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2017. Lecture Notes in Computer Science(), vol 10393. Springer, Cham. https://doi.org/10.1007/978-3-319-65482-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-65482-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65481-2
Online ISBN: 978-3-319-65482-9
eBook Packages: Computer ScienceComputer Science (R0)