Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing

The rapid advancements in the Internet of Things (IoT) and cloud computing technologies have significantly promoted the collection and sharing of various data. In order to reduce the communication cost and the storage overhead, it is necessary to exploit data deduplication mechanisms. However, existing data deduplication technologies still suffer security and efficiency drawbacks. In this paper, we propose two secure data deduplication schemes based on Rabin fingerprinting over wireless sensing data in cloud computing. The first scheme is based on deterministic tags and the other one adopts random tags. The proposed schemes realize data deduplication before the data is outsourced to the cloud storage server, and hence both the communication cost and the computation cost are reduced. In particular, variable-size block-level deduplication is enabled based on the technique of Rabin fingerprinting which generates data blocks based on the content of the data. Before outsourcing data to the cloud, users encrypt the data based on convergent encryption technologies, which protects the data from being accessed by unauthorized users. Our security analysis shows that the proposed schemes are secure against offline brute-force dictionary attacks. In addition, the random tag makes the second scheme more reliable. Extensive experimental results indicate that the proposed data deduplication schemes are efficient in terms of the deduplication rate, the system operation time, and the tag generation time.

[1]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[2]  Hao Wang,et al.  New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.

[3]  Rui Guo,et al.  A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience , 2018, Secur. Commun. Networks.

[4]  Lei Chen,et al.  Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT , 2019, IEEE Internet of Things Journal.

[5]  Sherman S. M. Chow,et al.  Towards Proofs of Ownership Beyond Bounded Leakage , 2016, ProvSec.

[6]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[7]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[8]  Jianfeng Ma,et al.  New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.

[9]  Chunyi Peng,et al.  An empirical analysis of similarity in virtual machine images , 2011, Middleware '11.

[10]  Rui Guo,et al.  Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing , 2018, Comput. Informatics.

[11]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[12]  H. Li,et al.  Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.

[13]  Tao Jiang,et al.  Secure and Efficient Cloud Data Deduplication With Randomized Tag , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Robert H. Deng,et al.  Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing , 2018, IEEE Transactions on Services Computing.

[15]  Guangjun Liu,et al.  RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data , 2017, Mobile Networks and Applications.

[16]  A. Broder Some applications of Rabin’s fingerprinting method , 1993 .

[17]  Jie Zhang,et al.  Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds , 2017, Secur. Commun. Networks.

[18]  Hyunsoo Kwon,et al.  Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).

[19]  Ning Ye,et al.  Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System , 2017, IEEE Transactions on Industrial Informatics.

[20]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[21]  Yinghui Zhang,et al.  Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice , 2018, J. Netw. Comput. Appl..

[22]  Robert H. Deng,et al.  Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..

[23]  Sean Wang Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming , 2016 .

[24]  Robert H. Deng,et al.  TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain , 2018, IEEE Access.

[25]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[26]  Chen Chen,et al.  Efficient and secure big data storage system with leakage resilience in cloud computing , 2018, Soft Comput..

[27]  Xingming Sun,et al.  Dynamic Resource Allocation for Load Balancing in Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[28]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[29]  Ting Wu,et al.  Generating stable biometric keys for flexible cloud computing authentication using finger vein , 2016, Inf. Sci..

[30]  Jiangang Shu,et al.  Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing” , 2019, IEEE Internet of Things Journal.

[31]  M. Shruthi,et al.  Secure Distributed Deduplication Systems with Improved Reliability , 2016 .

[32]  Xuan Li,et al.  A secure cloud storage system supporting privacy-preserving fuzzy deduplication , 2016, Soft Comput..

[33]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[34]  Jin Li,et al.  Rekeying for Encrypted Deduplication Storage , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[35]  Yinghui Zhang,et al.  Efficient and privacy-aware attribute-based data sharing in mobile cloud computing , 2017, Journal of Ambient Intelligence and Humanized Computing.

[36]  Jin Li,et al.  Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.

[37]  Jin Li,et al.  Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing , 2016, Secur. Commun. Networks.

[38]  Yunhao Liu,et al.  Towards Network-level Efficiency for Cloud Storage Services , 2014, Internet Measurement Conference.

[39]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[40]  Christian Esposito,et al.  Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.

[41]  David W. Chadwick,et al.  Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker , 2017, Secur. Commun. Networks.

[42]  Martín Abadi,et al.  Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..

[43]  G. Kalpana,et al.  Secure Auditing and Deduplicating Data in Cloud , 2016 .

[44]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[45]  Chunming Tang,et al.  Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..

[46]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[47]  Qi Han,et al.  Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks , 2012, NSS.

[48]  Yinghui Zhang,et al.  An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[49]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[50]  Jianfeng Ma,et al.  A remotely keyed file encryption scheme under mobile cloud computing , 2018, J. Netw. Comput. Appl..