Skip to main content
Log in

Secure Encrypted Data Deduplication Based on Data Popularity

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult. Current solutions rely heavily on trusted third parties, and does not recognize the popularity of data, resulting in unsatisfying security and efficiency. A secure encrypted data deduplication scheme based on data popularity is proposed. Tags are calculated via bilinear mapping to determine whether different encrypted data originate from the same plaintext. Ciphertext policy attribute-based encryption is used to protect the tags. A secure key delivery scheme is designed to pass the data encryption key from an initial data uploader to subsequent uploaders via the cloud server in an offline manner. The cloud server can perform deduplication without the assistance of any online third party. Security analysis and simulation experiments are provided, proving the practicability and efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134:26–39

    Article  Google Scholar 

  2. Yuan J, Chucheng Y (2013) Secure and constant cost public cloud storage auditing with deduplication. Commun Netw Secur IEEE:145–153

  3. Fu Y, Xiao N, Liu F (2012) Research and development on key techniques of data deduplication. J Comput Res Dev 49:12–20

    Google Scholar 

  4. Ao L, Shu J, Li M (2010) Data deduplication techniques. J Softw 21:916–929

    Article  Google Scholar 

  5. Zhang Y, Yu J, Hao R, Wang C, Ren K (2018) Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Dependable Secur Comput. https://doi.org/10.1109/TDSC.2018.2829880

  6. Meyer, DT, Bolosky, WJ (2012) A Study of Practical Deduplication. ACM Trans. Storage 7(4):1–20

  7. Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in aserverless distributed file system. In: International Conference on Distributed Computing System, IEEE, pp 617–624

  8. Seetharamulu U (2015) Cloud storage using convergent encryption technique. Int J Appl Eng Res 10:30–36

    Google Scholar 

  9. Puzio P, Molva R, Onen M (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE international Conference on Cloud Computing Technology & Science, pp 363–370

  10. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: EUROCRYPT, volume 7881 of lncs, Springer, pp 296–312

  11. Stanek J, Sorniotti A, Androulak E (2014) A secure data deduplication scheme for cloud storage. In: Christin N, Safavi-Naini, R eds, FC, volume 8437 of LNCS, Springer, pp 99–118

  12. Li J, Li J, Xie D et al (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396

    Article  MathSciNet  Google Scholar 

  13. Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd Usenix Conference on Security, USENIX Association, pp 179–194

  14. Puzio P, Molva R, Önen M, Loureiro S (2015) PerfectDedup: secure data deduplication. Volume 9481 of the series Lecture Notes in Computer Science pages. pp 150–166

  15. Jian Liu NA, Pinkas B (2015) Secure deduplication of encrypted data without additional independent servers. ACM Sigsac Conference on Computer and Communications Security ACM, pp 874–885

  16. Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Advances in crypto’04. Springer-Verlag, Berlin, pp 41–55

    Google Scholar 

  17. Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2896258

  18. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 321–334

  19. Cheung N (2007) Provably secure ciphertext policy ABE. In: ACM conference on Computer and Communications Security (ACM CCS), pp 456–465

  20. Cui H, Deng RH, Li Y (2016) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5:1–1

    Google Scholar 

  21. Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering 28(11):3113–3125

  22. Lynn B (2015) The pairing-based cryptographic library. http://crypto.Stanford.edu/pbc/

  23. Loukides O (1997) Programming with GNU SoftWare. O’Reilly & Associates, pp 350–359

  24. Bethencourt J, Sahai A, Waters B (2006) Ciphertext-policy attribute-based encryption. http://acsc.cs.utexas.edu/cpabe/

  25. Hu X, Qin Z, Zhang H, Hao G (2009) Research and improved implementation of AES algorithm in OpenSSL. Control Autom:83–85

Download references

Acknowledgements

This research is supported by Project ZR2019MF058 of Shandong Provincial Natural Science Foundation, the National Natural Science Foundation of China (Grant No. 61303197 and 61802214) and the Open Project Program of The State Key Laboratory of Integrated Services Networks (ISN19-14). Thanks to Mr. Zhao Yi for his support in the experiments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hequn Xian.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

He, Y., Xian, H., Wang, L. et al. Secure Encrypted Data Deduplication Based on Data Popularity. Mobile Netw Appl 26, 1686–1695 (2021). https://doi.org/10.1007/s11036-019-01504-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01504-3

Keywords

Navigation