Secure Deduplication Scheme for Cloud Encrypted Data

Cloudstorage(CS)isgainingmuchpopularitynowadaysbecauseitofferslow-costandconvenient networkstorageservices.Inthisbigdataera,theexplosivegrowthindigitaldatamovestheusers towardsCSbutthiscausesalotofstoragepressureonCSsystemsbecausealargevolumeofthis dataisredundant.Datadeduplicationisaneffectivedatareductiontechnique.Thedynamicnature ofdatamakessecurityandownershipofdataasaveryimportantissue.Proof-of-ownershipschemes arearobustwaytochecktheownershipclaimedbyanyowner.However,thismethodaffectsthe deduplication process because encryption methods have varying characteristics. A convergent encryption(CE)schemeiswidelyusedforsecuredatadeduplication.TheproblemwiththeCEbasedschemeisthattheusercandecrypttheclouddatawhilehehaslosthisownership.Thisarticle addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypteddata.Theproposedschemeenhancesthesecurityagainstunauthorizedencryptionand poisonattackonthepredictedsetofdata. KEywoRDS Cloud Storage, Convergent Encryption, Deduplication, Proof-of-Ownership

[1]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[2]  Ingrid Mulder,et al.  When Ubiquitous Computing Meets Experience Design: Identifying Challenges for Design and Evaluation , 2008 .

[3]  Miltiadis D. Lytras,et al.  Ubiquitous and pervasive knowledge and learning management : semantics, social networking and new media to their full potential , 2007 .

[4]  Irfan Ahmad,et al.  Decentralized Deduplication in SAN Cluster File Systems , 2009, USENIX Annual Technical Conference.

[5]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[6]  Hong Jiang,et al.  SAM: A Semantic-Aware Multi-tiered Source De-duplication Framework for Cloud Backup , 2010, 2010 39th International Conference on Parallel Processing.

[7]  M. Gross,et al.  Ubiquitous Computing : Design , Implementation , and Usability , 2008 .

[8]  Alexander Russell,et al.  How to fool an unbounded adversary with a short key , 2006, IEEE Trans. Inf. Theory.

[9]  Jia Xu,et al.  Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.

[10]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[11]  Edgar R. Weippl,et al.  Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space , 2011, USENIX Security Symposium.

[12]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[13]  Darrell D. E. Long,et al.  Secure data deduplication , 2008, StorageSS '08.

[14]  Shucheng Yu,et al.  Secure and constant cost public cloud storage auditing with deduplication , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[15]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[16]  Vijaykumar Javaraiah Backup for cloud and disaster recovery for consumers and SMBs , 2011, 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS).

[17]  Michela Bertolotto,et al.  Using Multimedia and Virtual Reality for Web-Based Collaborative Learning on Multiple Platforms , 2008 .

[18]  Marvin Theimer,et al.  Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.

[19]  Junbeom Hur,et al.  A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems , 2017, ACM Comput. Surv..