R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity

Abstract Deduplication technology is used extensively in applications such as cloud computing services to optimize their storage performance (e.g., cloud service providers store only one copy of identical data). However, due to the use of encryption (to ensure the confidentiality of data stored in the cloud), it can be challenging for cloud service providers to perform deduplication (e.g., due to the use of different keys on the same content). In this paper, we propose a randomized, secure, cross-user deduplication scheme (R-Dedup). The scheme does not involve any third-party entity (e.g., an additional cloud server) or require assistance from other users. In R-Dedup, the randomness feature means that users with identical copies of a file share the same random value via ElGamal encryption. The security analysis and experimental results demonstrate that R-Dedup is lightweight, and achieves both data privacy and data integrity.

[1]  Chuan Qin,et al.  The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System , 2017, ACM Trans. Storage.

[2]  Martín Abadi,et al.  Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..

[3]  Pin Zhou,et al.  Demystifying data deduplication , 2008, Companion '08.

[4]  Kai Li,et al.  Avoiding the Disk Bottleneck in the Data Domain Deduplication File System , 2008, FAST.

[5]  Shmuel Tomi Klein,et al.  The design of a similarity based deduplication system , 2009, SYSTOR '09.

[6]  Mihir Bellare,et al.  Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.

[7]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[8]  Yitao Duan,et al.  Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy , 2014, CCSW.

[9]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[10]  Lukas Kencl,et al.  Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage , 2018, IEEE Transactions on Dependable and Secure Computing.

[11]  Jianbing Ni,et al.  Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing , 2020, IEEE Transactions on Dependable and Secure Computing.

[12]  Chin-Chen Chang,et al.  Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[13]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[14]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[15]  Tao Jiang,et al.  DedupDUM: Secure and scalable data deduplication with dynamic user management , 2018, Inf. Sci..

[16]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[17]  Jianfeng Ma,et al.  Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing , 2019, IEEE Transactions on Services Computing.

[18]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[19]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[20]  Li Duan,et al.  Secure Deduplication of Encrypted Data: Refined Model and New Constructions , 2017, IACR Cryptol. ePrint Arch..

[21]  Benny Pinkas,et al.  Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.

[22]  Ran Canetti,et al.  Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.

[23]  Mihir Bellare,et al.  Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.

[24]  Robert H. Deng,et al.  Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.

[25]  Pierre Sens,et al.  Proceedings of Hotos Ix: the 9th Workshop on Hot Topics in Operating Systems Hotos Ix: the 9th Workshop on Hot Topics in Operating Systems Post: a Secure, Resilient, Cooperative Messaging System * , 2022 .

[26]  Le Zhang,et al.  Fast and Secure Laptop Backups with Encrypted De-duplication , 2010, LISA.