Skip to main content

Blockchain-Based Secure Cloud Data Deduplication with Traceability

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1267))

Abstract

Data deduplication technology makes the same data only keep one physical copy in the cloud, which can effectively eliminate data redundancy and achieve efficient storage. Data deduplication, especially encrypted data duplication, has become a research hotspot. Convergent encryption can effectively solve the existing problem of encrypted data deduplication. However, the cloud server cannot access plaintext data in the ciphertext environment, and it cannot check the consistency of the ciphertext and file label. Therefore, when the duplicate faking attack occurs, how to effectively trace malicious users becomes a critical problem. In this paper, we firstly introduce the blockchain technology into the scenario of secure data deduplication, and construct a specific deduplication scheme to solve the problem of malicious user tracing. We make use of the traceability of the blockchain to form a tamper-proof data chain. When the duplicate faking attack occurs, we can trace the identity of the malicious user and find out all the data files stored in the cloud server.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abadi, M., Boneh, D., Mironov, I., Raghunathan, A., Segev, G.: Message-locked encryption for lock-dependent messages. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 374–391. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40041-4_21

    Chapter  Google Scholar 

  2. American Bankers Association and others. Public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA), pp. 62–1998. ANSI X9 (1999)

    Google Scholar 

  3. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_18

    Chapter  Google Scholar 

  4. Ghoshal, S., Paul, G.: Exploiting block-chain data structure for auditorless auditing on cloud data. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 359–371. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49806-5_19

    Chapter  Google Scholar 

  5. González-Manzano, L., Orfila, A.: An efficient confidentiality-preserving proof of ownership for deduplication. J. Netw. Comput. Appl. 50, 49–59 (2015)

    Article  Google Scholar 

  6. Huang, H., Chen, X., Wang, J.: Blockchain-based multiple groups data sharing with anonymity and traceability. Sci. China Inf. Sci. 63(3), 1–13 (2019). https://doi.org/10.1007/s11432-018-9781-0

    Article  MathSciNet  Google Scholar 

  7. Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Fut. Gener. Comput. Syst. 78, 850–858 (2018)

    Article  Google Scholar 

  8. Wang, J., Chen, X., Li, J., Kluczniak, K., Kutylowski, M.: A new secure data deduplication approach supporting user traceability. In: 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 120–124. IEEE (2015)

    Google Scholar 

  9. Wang, J., Chen, X., Li, J., Kluczniak, K., Kutyłowski, M.: TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3), 270–289 (2017)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the Natural Science Foundation of Fujian Province of China under Grant (No. 2019J01750, No. 2019J01752); the Research Project of Fujian Provincial Education Department of China under Grant (No. JAT170345, No. JAT170346, and No. JK2017031); the Project of Key Laboratory of Financial Mathematics of Fujian Province University (Putian University) under Grant (No. JR201806); and the presidential research fund of Minnan Normal University (No. KJ18024).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, H., Chen, Q., Zhou, Y., Huang, Z. (2020). Blockchain-Based Secure Cloud Data Deduplication with Traceability. In: Zheng, Z., Dai, HN., Fu, X., Chen, B. (eds) Blockchain and Trustworthy Systems. BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9213-3_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9212-6

  • Online ISBN: 978-981-15-9213-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics