Skip to main content

Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment

  • Conference paper
  • First Online:
  • 1131 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 518))

Abstract

Data de-duplication technology is a technology that helps save storage space by preventing the same data from being repeatedly stored in data storage. There are various methods of data de-duplication, but in general, the file source is divided into data blocks of a predetermined size, and the data de-duplication efficiency is improved by comparing each block. Therefore, each data block has a separate ownership, and each ownership is made smaller than the original of the data block. In this case, an attacker who intends to acquire a block of data can guess the data that can be input into each data block, and thus can make a dictionary attack to acquire data ownership. This happens because each data has a separate ownership, and each ownership does not affect the acquisition of other blocks. Therefore, this study proposes a method to solve this problem.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kim KW, Joo YH, Eom YI (2012) Technical trends for cloud storage data deduplication. In: Proceedings of symposium of the Korean Institute of communications and information sciences, pp 228–229

    Google Scholar 

  2. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 296–312

    Chapter  Google Scholar 

  3. Halevi S, Hamik D, Pinkas B (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security. ACM, pp 491–500

    Google Scholar 

  4. Hur JB, Koo DY, Shin YJ, Kang KT (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):3113–3125

    Article  Google Scholar 

  5. Storer MW, Greenan K, Long DD (2008) Secure data deduplication. In: Proceedings of the 4th ACM international workshop on storage security and survivability, ACM, pp 1–10

    Google Scholar 

Download references

Acknowledgements

This work was supported by Barun ICT Research Center at Yonsei University and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1B03935917)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Im-Yeong Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, WB., Lee, IY. (2019). Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment. In: Park, J., Loia, V., Choo, KK., Yi, G. (eds) Advanced Multimedia and Ubiquitous Engineering. MUE FutureTech 2018 2018. Lecture Notes in Electrical Engineering, vol 518. Springer, Singapore. https://doi.org/10.1007/978-981-13-1328-8_70

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1328-8_70

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1327-1

  • Online ISBN: 978-981-13-1328-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics