Skip to main content
Log in

BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

Abstract

Secure deduplication aims to efficiently eliminate redundant data in cloud storage system, where convergent encryption (CE) is widely-used to provide the data confidentiality. As the number of convergent keys (CKs) in CE will increase dramatically with enlarging data, there is a critical issue that how to safely manage the CKs. Previous works usually introduce a fully-trusted key management server (KS) to ensure the CKs security, resulting in data leakage by KS in reality. In this paper, we propose a blockchain-based secure deduplication scheme with reliable CK management, denoted as BDKM, which introduces different secret information to CE to enhance the data confidentiality in different level deduplications. To realize secure and reliable CK management, the CK will be divided into key segments by using secret sharing scheme and distributed on blockchain as transactions. Therefore, only the valid data owner can recover the CK from the blockchain and the original data will be protected even if the adversaries have colluded with cloud service provider. Security analysis and performance evaluation demonstrate that our proposed scheme can remain secure under the proposed security models with a limited overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Dong M, Li H, Ota K et al (2014) HVSTO: efficient privacy preserving hybrid storage in cloud data center. In: International conference on computer communications

  2. Chen X, Li J, Ma J et al (2012) New algorithms for secure outsourcing of modular exponentiations. In: European symposium on research in computer security

  3. Zwolenski M, Weatherill L (2014) The digital universe: rich data and the increasing value of the internet of things. Aust J Telecommun Digit Econ 2(3):47

    Google Scholar 

  4. G. Drive (2017) http://drive.google.com/

  5. Dropbox (2007) http://www.dropbox.com/

  6. Mozy (2018) http://www.mozy.com/

  7. Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur Priv 8(6):40–47

    Article  Google Scholar 

  8. Borges EN, Carvalho MGD, Galante R et al (2011) An unsupervised heuristic-based approach for bibliographic metadata deduplication. Inf Process Manag 47(5):706–718

    Article  Google Scholar 

  9. Li J, Chen X, Huang X et al (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579

    Article  MathSciNet  Google Scholar 

  10. Yuan J, Yu S (2013) Secure and constant cost public cloud storage auditing with deduplication. In: Communications and networking symposium, pp 145–153

  11. Clements AT, Ahmad I, Vilayannur M et al (2009) Decentralized deduplication in SAN cluster file systems. In: USENIX annual technical conference, pp 8–8

  12. Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: USENIX security symposium, pp 179–194

  13. Miao M, Wang J, Li H et al (2015) Secure multi-server-aided data deduplication in cloud computing. Pervasive Mobile Comput 24:129–137

    Article  Google Scholar 

  14. Bellare M, Keelveedhi S (2013) Interactive message-locked encryption and secure deduplication. Springer, Berlin

    MATH  Google Scholar 

  15. Fan Y, Lin X, Liang W et al (2019) A secure privacy preserving deduplication scheme for cloud computing. Future Gener Comput Syst 101:127–135

    Article  Google Scholar 

  16. Li M, Qin C, Lee PPC (2015) CDStore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. In: Proceedings of the 2015 USENIX conference on usenix annual technical conference, pp 111–124

  17. Puzio P, Molva R, Önen M (2015) PerfectDedup: secure data deduplication. In: International workshop on data privacy management. Springer, Atlanta, pp 150–166

  18. Chen R, Yi M, Yang G et al (2015) BL-MLE: block-level message-locked encryption for secure large file deduplication. IEEE Trans Inf Forensics Secur 10(12):2643–2652

    Article  Google Scholar 

  19. Bobbarjung DR, Jagannathan S, Dubnicki C (2006) Improving duplicate elimination in storage systems. ACM Trans Storage 2(4):424–448

    Article  Google Scholar 

  20. Widodo RNS, Lim H, Atiquzzaman M (2017) A new content-defined chunking algorithm for data deduplication in cloud storage. Future Gener Comput Syst 71:145–156

    Article  Google Scholar 

  21. Li J, Li YK, Chen X et al (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216

    Article  Google Scholar 

  22. Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: International conference on distributed computing systems. Proceedings. IEEE, pp 617–624

  23. Wang L, Wang B, Song W et al (2019) A key-sharing based secure deduplication scheme in cloud storage. Inf Sci 504:48–60

    Article  MathSciNet  Google Scholar 

  24. Puzio P, Molva R, Nen M et al (2013) ClouDedup: secure deduplication with encrypted data for cloud storage. In: Proceedings of the 2013 IEEE international conference on cloud computing technology and science, vol 01

  25. Stanek J, Sorniotti A, Androulaki E et al (2014) A secure data deduplication scheme for cloud storage. In: International conference on financial cryptography and data security, pp 99–118

  26. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques

  27. Zhou Y, Feng D, Xia W et al (2015) SecDep: a user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In: IEEE conference on mass storage systems and technologies, pp 1–14

  28. Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Future Gener Comput Sys 88:156–167

    Article  Google Scholar 

  29. Li J, Chen X, Li M et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Article  Google Scholar 

  30. Kwon H, Hahn C, Koo D et al (2017) Scalable and reliable key management for secure deduplication in cloud storage. In: International conference on cloud computing, pp 391–398

  31. Halevi S, Harnik D, Pinkas B et al (2011) Proofs of ownership in remote storage systems. In: Computer and communications security

  32. Li L, Liu J, Chang X et al (2020) Toward conditionally anonymous bitcoin transactions: a lightweight-script approach. Inf Sci 509:290–303

    Article  Google Scholar 

  33. Cao S, Zhang G, Liu P et al (2019) Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Inf Sci 485:427–440

    Article  Google Scholar 

  34. Kabra N, Bhattacharya P, Tanwar S et al (2020) MudraChain: blockchain-based framework for automated cheque clearance in financial institutions. Future Gener Comput Syst 102:574–587

    Article  Google Scholar 

  35. Au MH, Han J, Wu Q et al (2020) Special issue on cryptographic currency and blockchain technology. Future Gener Comput Syst 107:758–759

    Article  Google Scholar 

  36. Naor M, Reingold O (2004) Number-theoretic constructions of efficient pseudo-random functions. J ACM 51(2):231–262

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 62076073), the Guangdong Basic and Applied Basic Research Foundation (No. 2020A1515010616), the Guangdong Innovative Research Team Program (No. 2014ZT05G157), the Key-Area Research and Development Program of Guangdong Province (2019B010136001), and the Science and Technology Planning Project of Guangdong Province LZC0023, the Faculty Research Fund (DB21A9) and the HKIBS Research Program Grant Application (HCRG-201-002, 702024) at Lingnan University, Hong Kong.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zhenguo Yang or Wenyin Liu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, G., Xie, H., Yang, Z. et al. BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management. Neural Process Lett 54, 2657–2674 (2022). https://doi.org/10.1007/s11063-021-10450-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-021-10450-9

Keywords

Navigation