Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing

In commercial fog computing, block-level client-side deduplication (BC-Dedu) can be used to save storage space and network bandwidth. However, the existing BC-Dedu schemes cannot support ownership management, which leads to the degradation of forward and backward secrecy of the outsourced data. Besides, BC-Dedu schemes are vulnerable to the side information leakage issue since the existence of data is revealed to the outside adversary. In this paper, we propose an anti-leakage BC-Dedu scheme that supports ownership management in fog computing. Specifically, we present a dual-level ownership list and key update mechanism to achieve ownership management in the proposed scheme. Besides, we construct a novel deduplication protocol to alleviate the side information leakage issue. Furthermore, a dynamic data storage strategy is proposed to reduce service costs and latency. Security and performance analyses demonstrate that the proposed scheme achieves the desired security requirements while saving resource efficiently.

[1]  Jitendra Singh,et al.  Cyber-Attacks in Cloud Computing: A Case Study , 2014 .

[2]  Sherman S. M. Chow,et al.  Updatable Block-Level Message-Locked Encryption , 2017, IEEE Transactions on Dependable and Secure Computing.

[3]  Refik Molva,et al.  ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[4]  Tao Jiang,et al.  Secure and Efficient Cloud Data Deduplication with Ownership Management , 2020, IEEE Transactions on Services Computing.

[5]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[6]  Wang Zhenyu,et al.  A Policy-based De-duplication Mechanism for Securing Cloud Storage , 2015 .

[7]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[8]  Yang Chao,et al.  Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion , 2015 .

[9]  Junbeom Hur,et al.  A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).

[10]  Jianfeng Wang,et al.  TrDup: enhancing secure data deduplication with user traceability in cloud computing , 2017, Int. J. Web Grid Serv..

[11]  Ku-Young Chang,et al.  Client‐Side Deduplication to Enhance Security and Reduce Communication Costs , 2017 .

[12]  W. Marsden I and J , 2012 .

[13]  Junbeom Hur,et al.  Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing , 2018, Future Gener. Comput. Syst..

[14]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[15]  Kyungtae Kang,et al.  Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage , 2016, IEEE Transactions on Knowledge and Data Engineering.

[16]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[17]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[18]  Yu Cheng,et al.  Distributed resource sharing in fog-assisted big data streaming , 2017, 2017 IEEE International Conference on Communications (ICC).

[19]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[20]  Dooho Choi,et al.  Privacy-preserving cross-user source-based data deduplication in cloud storage , 2012, 2012 International Conference on ICT Convergence (ICTC).

[21]  J. Kumar SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD , 2016 .

[22]  Fuchun Guo,et al.  BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Jia Xu,et al.  Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.

[24]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.