Secure Deduplication in a Multiple Group Signature Setting

Multiple group setting schemes have recently become important for enabling deduplication for cloud servers. We consider a new primitive, cross-group deduplication, allowing the multiple groups by the group signature features. We propose a new framework DDUP-MUG (deduplication for the multiplegroup signature scheme) that allows one or more groups to accessa file such that the cloud storage server can avoid duplicates according to the ownership of the file. The main goal of the primitive is allowing to multiple groups with individual management and several clients from different groups who attempt tostore an identical message on the server. In this paper, the group managers mainly manage the new entities and produce revocation lists for clients and the server respectively. We use Message Lock Encryption (MLE) as an ingredient for deduplication and weprovide new three protocols, namely UPL-Dup (for uploading a new message), EDT-Dup (for editing the existing message) and DEL-Dup (for eliminating the existing message) in the DDUPMUG framework.

[1]  Darrell D. E. Long,et al.  Secure data deduplication , 2008, StorageSS '08.

[2]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[3]  Daniel Slamanig,et al.  Cryptography for Security and Privacy in Cloud Computing , 2013 .

[4]  Fuchun Guo,et al.  BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Jia Xu,et al.  Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.

[6]  Kwangjo Kim,et al.  Security weakness in the Proof of Storage with Deduplication , 2012, IACR Cryptol. ePrint Arch..

[7]  Dongdai Lin,et al.  Unlinkable Randomizable Signature and Its Application in Group Signature , 2007, Inscrypt.

[8]  Martín Abadi,et al.  Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..

[9]  Mehmet Sabir Kiraz,et al.  Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing , 2016, IACR Cryptol. ePrint Arch..

[10]  Mihir Bellare,et al.  Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.

[11]  Mihir Bellare,et al.  Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.

[12]  Hovav Shacham,et al.  Group signatures with verifier-local revocation , 2004, CCS '04.

[13]  Shouhuai Xu,et al.  Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.

[14]  Mihir Bellare,et al.  OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.

[15]  Nobuo Funabiki,et al.  Revocable Group Signature Schemes with Constant Costs for Signing and Verifying , 2010 .

[16]  Roberto Di Pietro,et al.  Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.

[17]  Moti Yung,et al.  Fair Traceable Multi-Group Signatures , 2008, Financial Cryptography.

[18]  Cong Wang,et al.  Enabling Encrypted Cloud Media Center with Secure Deduplication , 2015, AsiaCCS.

[19]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[20]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[21]  Shucheng Yu,et al.  Secure and constant cost public cloud storage auditing with deduplication , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[22]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[23]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[24]  Lise Getoor,et al.  Deduplication and Group Detection using Links , 2004 .

[25]  Fabio Martinelli,et al.  Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers , 2016, DPM/QASA@ESORICS.

[26]  Refik Molva,et al.  ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[27]  Aayush Agarwal,et al.  A Survey of Group Signature Technique, its Applications and Attacks , 2013 .

[28]  Refik Molva,et al.  PerfectDedup: Secure Data Deduplication , 2015, DPM/QASA@ESORICS.

[29]  Ghassan O. Karame,et al.  Transparent Data Deduplication in the Cloud , 2015, CCS.

[30]  Yucheng Zhang,et al.  SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management , 2015, 2015 31st Symposium on Mass Storage Systems and Technologies (MSST).