skip to main content
research-article

FASTSync: A FAST Delta Sync Scheme for Encrypted Cloud Storage in High-bandwidth Network Environments

Published:03 October 2023Publication History
Skip Abstract Section

Abstract

More and more data are stored in cloud storage, which brings two major challenges. First, the modified files in the cloud should be quickly synchronized to ensure data consistency, e.g., delta synchronization (sync) achieves efficient cloud sync by synchronizing only the updated part of the file. Second, the huge data in the cloud needs to be deduplicated and encrypted, e.g., Message-Locked Encryption (MLE) implements data deduplication by encrypting the content among different users. However, when combined, a few updates in the content can cause large sync traffic amplification for both keys and ciphertext in the MLE-based cloud storage, significantly degrading the cloud sync efficiency. A feature-based encryption sync scheme, FeatureSync, is proposed to address the delta amplification problem. However, with further improvement of the network bandwidth, the performance of FeatureSync stagnates. In our preliminary experimental evaluations, we find that the bottleneck of the computational overhead in the high-bandwidth network environments is the main bottleneck in FeatureSync. In this article, we propose an enhanced feature-based encryption sync scheme FASTSync to optimize the performance of FeatureSync in high-bandwidth network environments. The performance evaluations on a lightweight prototype implementation of FASTSync show that FASTSync reduces the cloud sync time by 70.3% and the encryption time by 37.3%, on average, compared with FeatureSync.

REFERENCES

  1. [1] iCloud Apple. 2022. Retrieved from https://www.icloud.com/.Google ScholarGoogle Scholar
  2. [2] Bellare Mihir, Keelveedhi Sriram, and Ristenpart Thomas. 2013. Message-locked encryption and secure deduplication. In Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’13).Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Bobbarjung Deepak R., Jagannathan Suresh, and Dubnicki Cezary. 2006. Improving duplicate elimination in storage systems. ACM Trans. Storage 2, 4 (2006), 424448.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Boxcrypto. 2022. Retrieved from https://www.boxcryptor.com/en/.Google ScholarGoogle Scholar
  5. [5] Broder Andrei Z.. 1997. On the resemblance and containment of documents. In Proceedings of the Compression and Complexity of SEQUENCES.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Control Linux Traffic. 2022. Retrieved from https://tldp.org/HOWTO/Traffic-Control-HOWTO/intro.html.Google ScholarGoogle Scholar
  7. [7] Cui Yong, Lai Zeqi, Wang Xin, Dai Ningwei, and Miao Congcong. 2015. QuickSync: Improving synchronization efficiency for mobile cloud storage services. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom’15).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Douceur John R., Adya Atul, Bolosky William J., Simon P., and Theimer Marvin. 2002. Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS’02).Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Douglis Fred. 2003. Application-specific delta-encoding via resemblance detection. In Proceedings of the USENIX Annual Technical Conference (ATC’03).Google ScholarGoogle Scholar
  10. [10] Dropbox. 2022. Retrieved from: http://www.dropboxchina.com/.Google ScholarGoogle Scholar
  11. [11] storage Sookasa’s encrypted cloud. 2015. Retrieved from: https://www.sookasa.com/resources/encrypted-cloud-storage/.Google ScholarGoogle Scholar
  12. [12] FastCDC. 2022. Retrieved from: https://github.com/Quicksandlyh/FastCDC-c/.Google ScholarGoogle Scholar
  13. [13] sync Seafile: Enterprise file, reliability share platform with high, and performance. 2022. Retrieved from: https://www.seafile.com/en/home.Google ScholarGoogle Scholar
  14. [14] Github. 2022. Retrieved from: https://github.com/.Google ScholarGoogle Scholar
  15. [15] Drive Google. 2022. Retrieved from: https://drive.google.com/.Google ScholarGoogle Scholar
  16. [16] HashMap. 2022. Retrieved from: https://github.com/tidwall/hashmap.c/.Google ScholarGoogle Scholar
  17. [17] He Yuan, Xiang Lingfeng, Xia Wen, Jiang Hong, Li Zhenhua, Wang Xuan, and Zou Xiangyu. 2020. Dsync: A lightweight delta synchronization approach for cloud storage services. In Proceedings of the 36th Symposium on Mass Storage Systems and Technologies (MSST’20).Google ScholarGoogle Scholar
  18. [18] Keelveedhi Sriram, Bellare Mihir, and Ristenpart Thomas. 2013. DupLESS: Server-aided encryption for deduplicated storage. In Proceedings of the 22th USENIX Security Symposium (Security’13).Google ScholarGoogle Scholar
  19. [19] Kernel Linux. 2022. Retrieved from: https://www.kernel.org/.Google ScholarGoogle Scholar
  20. [20] Kulkarni Purushottam, Douglis Fred, Lavoie Jason D., and Tracey John M.. 2004. Redundancy elimination within large collections of files. In Proceedings of the USENIX Annual Technical Conference (ATC’04).Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Li Jingwei, Lee Patrick P. C., Ren Yanjing, and Zhang Xiaosong. 2019. Metadedup: Deduplicating metadata in encrypted deduplication via indirection. In Proceedings of the 35th Symposium on Mass Storage Systems and Technologies (MSST’19).Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Li Jingwei, Qin Chuan, Lee Patrick P. C., and Zhang Xiaosong. 2017. Information leakage in encrypted deduplication via frequency analysis. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’17).Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Li Jingwei, Yang Zuoru, Ren Yanjing, Lee Patrick P. C., and Zhang Xiaosong. 2020. Balancing storage efficiency and data confidentiality with tunable encrypted deduplication. In Proceedings of the 15th EuroSys Conference (EuroSys’20).Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Li Zhenhua, Wilson Christo, Jiang Zhefu, Liu Yao, Zhao Ben Y., Jin Cheng, Zhang Zhi-Li, and Dai Yafei. 2013. Efficient batched synchronization in Dropbox-like cloud storage services. In Proceedings of the 14th International Middleware Conference (Middleware’13).Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] MacDonald J.. 2000. File System Support for Delta Compression. Master’s thesis. Department of Electrical Engineering and Computer Science, University of California at Berkeley.Google ScholarGoogle Scholar
  26. [26] Mao Bo, Jiang Hong, Wu Suzhen, and Tian Lei. 2016. Leveraging data deduplication to improve the performance of primary storage systems in the cloud. IEEE Trans. Comput. 65, 6 (2016), 17751788.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Mao Bo, Wu Suzhen, and Jiang Hong. 2016. Exploiting workload characteristics and service diversity to improve the availability of cloud storage systems. IEEE Trans. Parallel Distrib. Syst. 27, 7 (2016), 20102021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] OneDrive Microsoft. 2022. Retrieved from: https://drive.google.com/.Google ScholarGoogle Scholar
  29. [29] Mohiuddin Irfan, Almogren Ahmad, Qurishi Mohammed Al, Hassan Mohammad Mehedi, Rassan Iehab Al, and Fortino Giancarlo. 2019. Secure distributed adaptive bin packing algorithm for cloud storage. Fut. Gen. Comput. Syst. 90 (2019), 307316.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Muthitacharoen Athicha, Chen Benjie, and Mazières David. 2001. A low-bandwidth network file system. In Proceedings of the 18th ACM Symposium on Operating System Principles (SOSP’01).Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] OpenSSL. 2022. Retrieved from: https://github.com/openssl/openssl.Google ScholarGoogle Scholar
  32. [32] Qin Chuan, Li Jingwei, and Lee Patrick P. C.. 2019. The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Trans. Storage 13, 1 (2017), 130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Shilane Philip, Huang Mark, Wallace Grant, and Hsu Windsor. 2012. WAN-optimized replication of backup datasets using stream-informed delta compression. ACM Trans. Storage 8, 4 (2012), 126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Suel Torsten and Nasir Memon. 2002. Algorithms for delta compression and remote file synchronization. In Handbook of Lossless Compression, S. Sayood (Ed.). Academic Press.Google ScholarGoogle Scholar
  35. [35] Wu Suzhen, Liu Longquan, Jiang Hong, Che Hao, and Mao Bo. 2019. PandaSync: Network and workload aware hybrid cloud sync optimization. In Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS’19).Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Wu Suzhen, Mao Bo, Jiang Hong, Luan Huagao, and Zhou Jindong. 2019. PFP: Improving the reliability of deduplication-based storage systems with per-file parity. IEEE Trans. Parallel Distrib. Syst. 30, 9 (2019), 21172129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Wu Suzhen, Tu Zhanhong, Wang Zuocheng, Shen Zhirong, and Mao Bo. 2021. When delta sync meets message-locked encryption: A feature-based delta sync scheme for encrypted cloud storage. In Proceedings of the 41st IEEE International Conference on Distributed Computing Systems (ICDCS’21). 337347.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Xia Wen, Jiang Hong, Feng Dan, Douglis F., Shilane P., Hua Yu, Fu Min, Zhang Yucheng, and Zhou Yukun. 2016. A comprehensive study of the past, present, and future of data deduplication. Proc. IEEE 104 (2016), 16811710.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Xia Wen, Jiang Hong, Feng Dan, Tian Lei, Fu Min, and Zhou Yukun. 2014. Ddelta: A deduplication-inspired fast delta compression approach. Perform. Eval. 79 (2014), 258272.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Xia Wen, Zhou Yukun, Jiang Hong, Feng Dan, Hua Yu, Hu Yuchong, Liu Qing, and Zhang Yucheng. 2016. FastCDC: A fast and efficient content-defined chunking approach for data deduplication. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC’16), Gulati Ajay and Weatherspoon Hakim (Eds.). 101114.Google ScholarGoogle Scholar
  41. [41] Xiao He, Li Zhenhua, Zhai Ennan, Xu Tianyin, Li Yang, Liu Yunhao, Zhang Quanlu, and Liu Yao. 2018. Towards web-based delta synchronization for cloud storage services. In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST’18).Google ScholarGoogle Scholar
  42. [42] Zhang Quanlu, Li Zhenhua, Yang Zhi, Li Shenglong, and Dai Yafei. 2017. DeltaCFS: Boosting delta sync for cloud storage services by learning from NFS. In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS’17).Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Zhou Yukun, Feng Dan, Xia Wen, Fu Min, and Li Chunguang. 2015. SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In Proceedings of the IEEE 31st Symposium on Mass Storage Systems and Technologies (MSST’15).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. FASTSync: A FAST Delta Sync Scheme for Encrypted Cloud Storage in High-bandwidth Network Environments

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Storage
        ACM Transactions on Storage  Volume 19, Issue 4
        November 2023
        238 pages
        ISSN:1553-3077
        EISSN:1553-3093
        DOI:10.1145/3626486
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 October 2023
        • Online AM: 7 July 2023
        • Accepted: 20 June 2023
        • Revised: 22 March 2023
        • Received: 27 September 2022
        Published in tos Volume 19, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text