Abstract
Recently, some researchers adopt key-encrypting key (KEK) tree to realize efficient ownership management in deduplication scheme. However, none of the existing schemes realize the data sharing based on KEK tree. In this paper, we propose a randomized client-side deduplication scheme that alleviates duplicate-faking attack and uses randomized file tags to resist the offline brute-force attack launched by outside adversary. Besides, we propose a novel data sharing technique based on KEK tree. Security and efficiency analyses show that our scheme achieves the desired security requirements while saving system resource efficiently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pooranian, Z., Conti, M.: RARE: defeating side channels based on data deduplication in cloud storage. In: INFOCOM Workshops CCSNA (2018)
Douceur, J., Adya, A., Bolosky, W., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE, Vienna (2002)
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_18
Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: SEC 2013 Proceedings of the 22nd USENIX Conference on Security, pp. 179–194. ACM, Washington (2013)
Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the ACM Conference on Computerand Communications Security, pp. 874–885. ACM, Colorado (2015)
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: CCS 2011, pp. 491–500. ACM, Chicago (2011)
Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2016)
Wang, J., Chen, X., Li, J., Kluczniak, K., Kutylowski, M.: A new secure data deduplication approach supporting user traceability. In: 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, pp. 120–124. IEEE, Krakow (2015)
Kim, K., Youn, T., Jho, N., Chang, K.: Client-side deduplication to enhance security and reduce communication costs. ETRI J. 39(1), 116–123 (2017)
Hur, J., Koo, D., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113–3125 (2016)
Jiang, S., Jiang, T., Wang, L.: Secure and efficient cloud data deduplication with ownership management. IEEE Trans. Serv. Comput., 1–14 (2017). https://ieeexplore.ieee.org/document/8100969
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
Acknowledgment
This work is supported by the Fundamental Research Funds for the Central Universities (XJS17053, JBF181501).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ma, H., Tian, G., Liu, Z., Zhang, L. (2018). Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-3095-7_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3094-0
Online ISBN: 978-981-13-3095-7
eBook Packages: Computer ScienceComputer Science (R0)