Skip to main content

A Secure Cloud Backup System with Deduplication and Assured Deletion

  • Conference paper
  • First Online:
Provable Security (ProvSec 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10592))

Included in the following conference series:

Abstract

Cloud backup has been widely used in recent years. Over time, if the stored content is not under control, there will be a lot of redundant data stored in the cloud. When a user issues a delete instruction, the cloud service provider may not actually destroy the data, so that the user’s data is exposed to the risk of being compromised. In order to avoid storing duplicate data and prevent deleted data from being recovered, we design a cloud backup system that can solve the two problems. No matter how large the files, each client only keeps one key. Through the experimental evaluation, we verify that our scheme is valid and our local overhead is greatly saved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellare, M., Keelveedhi, S., Ristenpart, T.: Dupless: server-aided encryption for deduplicated storage. IACR Cryptology ePrint Archive 2013, 429 (2013)

    Google Scholar 

  2. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38348-9_18

    Chapter  Google Scholar 

  3. Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE (2002)

    Google Scholar 

  4. Habib, A.B., Khanam, T., Palit, R.: Simplified file assured deletion (sfade) - a user friendly overlay approach for data security in cloud storage system. In: International Conference on Advances in Computing, Communications and Informatics, pp. 1640–1644 (2013)

    Google Scholar 

  5. Li, J., Chen, X., Li, M., Li, J., Lee, P.P., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014)

    Article  Google Scholar 

  6. Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  7. Luo, Y., Xu, M., Fu, S., Wang, D.: Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing. pp. 17–23. ACM (2016)

    Google Scholar 

  8. Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: 2014 IEEE 34th International Conference on Distributed Computing Systems (ICDCS), pp. 308–317. IEEE (2014)

    Google Scholar 

  9. Perlman, R.: File system design with assured delete. In: Third IEEE International Security in Storage Workshop, SISW 2005, p. 6. IEEE (2005)

    Google Scholar 

  10. Rahumed, A., Chen, H.C., Tang, Y., Lee, P.P., Lui, J.C.: A secure cloud backup system with assured deletion and version control. In: 2011 40th International Conference on Parallel Processing Workshops (ICPPW), pp. 160–167. IEEE (2011)

    Google Scholar 

  11. Reardon, J., Basin, D., Capkun, S.: On secure data deletion. IEEE Secur. Priv. 12(3), 37–44 (2014)

    Article  Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  13. Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380–397. Springer, Heidelberg (2010). doi:10.1007/978-3-642-16161-2_22

    Chapter  Google Scholar 

  14. Tang, Y., Lee, P.P., Lui, J.C., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)

    Article  Google Scholar 

  15. Tezuka, S., Uda, R., Okada, K.: Adec: assured deletion and verifiable version control for cloud storage. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 23–30. IEEE (2012)

    Google Scholar 

Download references

Acknowledgment

We are grateful to the anonymous reviewers for their helpful comments. The work of Junzuo Lai was supported by National Natural Science Foundation of China (No. 61572235), Guangdong Natural Science Funds for Distinguished Young Scholar (No. 2015A030306045), and Pearl River S&T Nova Program of Guangzhou.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuansheng Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lai, J., Xiong, J., Wang, C., Wu, G., Li, Y. (2017). A Secure Cloud Backup System with Deduplication and Assured Deletion. In: Okamoto, T., Yu, Y., Au, M., Li, Y. (eds) Provable Security. ProvSec 2017. Lecture Notes in Computer Science(), vol 10592. Springer, Cham. https://doi.org/10.1007/978-3-319-68637-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68637-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68636-3

  • Online ISBN: 978-3-319-68637-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics