Abstract
Cloud backup has been widely used in recent years. Over time, if the stored content is not under control, there will be a lot of redundant data stored in the cloud. When a user issues a delete instruction, the cloud service provider may not actually destroy the data, so that the user’s data is exposed to the risk of being compromised. In order to avoid storing duplicate data and prevent deleted data from being recovered, we design a cloud backup system that can solve the two problems. No matter how large the files, each client only keeps one key. Through the experimental evaluation, we verify that our scheme is valid and our local overhead is greatly saved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare, M., Keelveedhi, S., Ristenpart, T.: Dupless: server-aided encryption for deduplicated storage. IACR Cryptology ePrint Archive 2013, 429 (2013)
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38348-9_18
Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE (2002)
Habib, A.B., Khanam, T., Palit, R.: Simplified file assured deletion (sfade) - a user friendly overlay approach for data security in cloud storage system. In: International Conference on Advances in Computing, Communications and Informatics, pp. 1640–1644 (2013)
Li, J., Chen, X., Li, M., Li, J., Lee, P.P., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014)
Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2016)
Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing. pp. 17–23. ACM (2016)
Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: 2014 IEEE 34th International Conference on Distributed Computing Systems (ICDCS), pp. 308–317. IEEE (2014)
Perlman, R.: File system design with assured delete. In: Third IEEE International Security in Storage Workshop, SISW 2005, p. 6. IEEE (2005)
Rahumed, A., Chen, H.C., Tang, Y., Lee, P.P., Lui, J.C.: A secure cloud backup system with assured deletion and version control. In: 2011 40th International Conference on Parallel Processing Workshops (ICPPW), pp. 160–167. IEEE (2011)
Reardon, J., Basin, D., Capkun, S.: On secure data deletion. IEEE Secur. Priv. 12(3), 37–44 (2014)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16161-2_22
Tang, Y., Lee, P.P., Lui, J.C., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)
Tezuka, S., Uda, R., Okada, K.: Adec: assured deletion and verifiable version control for cloud storage. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 23–30. IEEE (2012)
Acknowledgment
We are grateful to the anonymous reviewers for their helpful comments. The work of Junzuo Lai was supported by National Natural Science Foundation of China (No. 61572235), Guangdong Natural Science Funds for Distinguished Young Scholar (No. 2015A030306045), and Pearl River S&T Nova Program of Guangzhou.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lai, J., Xiong, J., Wang, C., Wu, G., Li, Y. (2017). A Secure Cloud Backup System with Deduplication and Assured Deletion. In: Okamoto, T., Yu, Y., Au, M., Li, Y. (eds) Provable Security. ProvSec 2017. Lecture Notes in Computer Science(), vol 10592. Springer, Cham. https://doi.org/10.1007/978-3-319-68637-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-68637-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68636-3
Online ISBN: 978-3-319-68637-0
eBook Packages: Computer ScienceComputer Science (R0)