Abstract
Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult. Current solutions rely heavily on trusted third parties, and does not recognize the popularity of data, resulting in unsatisfying security and efficiency. A secure encrypted data deduplication scheme based on data popularity is proposed. Tags are calculated via bilinear mapping to determine whether different encrypted data originate from the same plaintext. Ciphertext policy attribute-based encryption is used to protect the tags. A secure key delivery scheme is designed to pass the data encryption key from an initial data uploader to subsequent uploaders via the cloud server in an offline manner. The cloud server can perform deduplication without the assistance of any online third party. Security analysis and simulation experiments are provided, proving the practicability and efficiency of the proposed scheme.
Similar content being viewed by others
References
Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134:26–39
Yuan J, Chucheng Y (2013) Secure and constant cost public cloud storage auditing with deduplication. Commun Netw Secur IEEE:145–153
Fu Y, Xiao N, Liu F (2012) Research and development on key techniques of data deduplication. J Comput Res Dev 49:12–20
Ao L, Shu J, Li M (2010) Data deduplication techniques. J Softw 21:916–929
Zhang Y, Yu J, Hao R, Wang C, Ren K (2018) Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Dependable Secur Comput. https://doi.org/10.1109/TDSC.2018.2829880
Meyer, DT, Bolosky, WJ (2012) A Study of Practical Deduplication. ACM Trans. Storage 7(4):1–20
Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in aserverless distributed file system. In: International Conference on Distributed Computing System, IEEE, pp 617–624
Seetharamulu U (2015) Cloud storage using convergent encryption technique. Int J Appl Eng Res 10:30–36
Puzio P, Molva R, Onen M (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE international Conference on Cloud Computing Technology & Science, pp 363–370
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: EUROCRYPT, volume 7881 of lncs, Springer, pp 296–312
Stanek J, Sorniotti A, Androulak E (2014) A secure data deduplication scheme for cloud storage. In: Christin N, Safavi-Naini, R eds, FC, volume 8437 of LNCS, Springer, pp 99–118
Li J, Li J, Xie D et al (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396
Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd Usenix Conference on Security, USENIX Association, pp 179–194
Puzio P, Molva R, Önen M, Loureiro S (2015) PerfectDedup: secure data deduplication. Volume 9481 of the series Lecture Notes in Computer Science pages. pp 150–166
Jian Liu NA, Pinkas B (2015) Secure deduplication of encrypted data without additional independent servers. ACM Sigsac Conference on Computer and Communications Security ACM, pp 874–885
Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Advances in crypto’04. Springer-Verlag, Berlin, pp 41–55
Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2896258
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 321–334
Cheung N (2007) Provably secure ciphertext policy ABE. In: ACM conference on Computer and Communications Security (ACM CCS), pp 456–465
Cui H, Deng RH, Li Y (2016) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5:1–1
Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering 28(11):3113–3125
Lynn B (2015) The pairing-based cryptographic library. http://crypto.Stanford.edu/pbc/
Loukides O (1997) Programming with GNU SoftWare. O’Reilly & Associates, pp 350–359
Bethencourt J, Sahai A, Waters B (2006) Ciphertext-policy attribute-based encryption. http://acsc.cs.utexas.edu/cpabe/
Hu X, Qin Z, Zhang H, Hao G (2009) Research and improved implementation of AES algorithm in OpenSSL. Control Autom:83–85
Acknowledgements
This research is supported by Project ZR2019MF058 of Shandong Provincial Natural Science Foundation, the National Natural Science Foundation of China (Grant No. 61303197 and 61802214) and the Open Project Program of The State Key Laboratory of Integrated Services Networks (ISN19-14). Thanks to Mr. Zhao Yi for his support in the experiments.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
He, Y., Xian, H., Wang, L. et al. Secure Encrypted Data Deduplication Based on Data Popularity. Mobile Netw Appl 26, 1686–1695 (2021). https://doi.org/10.1007/s11036-019-01504-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01504-3