Secure and efficient proof of ownership for deduplicated cloud storage

The rapid increment in volume of outsourced data has raised an issue of data management for Cloud Storage Server. To solve this issue, Deduplication, a data compression technique was introduced which avoids duplicate data storage. However, Deduplication is vulnerable to malicious access to genuine Cloud Clients' files. An adversary can get access to file by learning small piece of knowledge about the file. In this paper, we propose secure and efficient Proof of Ownership for Deduplicated Cloud Storage. Our approach employs a technique of random matrix based challenges retrieved from the file. We evaluate security and efficiency of our approach by theoretical proofs and experimental results.

[1]  Hong Jiang,et al.  A Comprehensive Study of the Past, Present, and Future of Data Deduplication , 2016, Proceedings of the IEEE.

[2]  Virginia Vassilevska Williams Multiplying matrices in O(n 2:373 ) time , 2014 .

[3]  Jing Chen,et al.  Proofs of Ownership and Retrievability in Cloud Storage , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Roberto Di Pietro,et al.  Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.

[5]  Dutch T. Meyer,et al.  A study of practical deduplication , 2011, TOS.

[6]  Jay Dave,et al.  Securing SQL with Access Control for Database as a Service Model , 2016, ICTCS.

[7]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[8]  Vijay Laxmi,et al.  Behavioural detection with API call-grams to identify malicious PE files , 2012, SecurIT '12.

[9]  Won So,et al.  Lamassu: Storage-Efficient Host-Side Encryption , 2015, USENIX Annual Technical Conference.

[10]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[11]  Vijay Laxmi,et al.  DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.

[12]  Vijay Laxmi,et al.  DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis , 2016, Recent Advances in Computational Intelligence in Defense and Security.

[13]  Roberto Di Pietro,et al.  Proof of ownership for deduplication systems: A secure, scalable, and efficient solution , 2016, Comput. Commun..

[14]  Kyungtae Kang,et al.  Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage , 2016, IEEE Transactions on Knowledge and Data Engineering.

[15]  Ronald L. Rivest,et al.  Introduction to Algorithms, third edition , 2009 .

[16]  Ghassan O. Karame,et al.  Transparent Data Deduplication in the Cloud , 2015, CCS.

[17]  Chao Yang,et al.  Provable ownership of files in deduplication cloud storage , 2015, Secur. Commun. Networks.

[18]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[19]  Mingqiang Li,et al.  CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal , 2015, IEEE Internet Computing.

[20]  Junbeom Hur,et al.  A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems , 2017, ACM Comput. Surv..

[21]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[22]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[23]  Refik Molva,et al.  PerfectDedup: Secure Data Deduplication , 2015, DPM/QASA@ESORICS.

[24]  Jia Xu,et al.  Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.

[25]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[26]  João Paulo,et al.  A Survey and Classification of Storage Deduplication Systems , 2014, ACM Comput. Surv..

[27]  Vijay Laxmi,et al.  FlowMine: Android app analysis via data flow , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[28]  Refik Molva,et al.  ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[29]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[30]  Nesrine Kaaniche,et al.  A Secure Client Side Deduplication Scheme in Cloud Storage Environments , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[31]  Vijay Kumar,et al.  Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps , 2014, SecureComm.

[32]  J. Kumar SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD , 2016 .

[33]  Fuchun Guo,et al.  BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.