DICE: A dual integrity convergent encryption protocol for client side secure data deduplication

Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth. We introduce a new client-side deduplication protocol, called DICE (Dual Integrity Convergent Encryption), in which we perform tag checking and send the hash instead of the entire message over the network, resulting in a reduction of communication and computation cost without any loss of security. Our strategy is secure against both the erasure and the duplicate-faking attacks (known as a poison attack when performed together). Comparative analysis with other existing strategies validate the efficacy of the proposed protocol.

[1]  Elton Torres,et al.  Storage services in private clouds: Analysis, performance and availability modeling , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[2]  Martín Abadi,et al.  Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..

[3]  Darrell D. E. Long,et al.  Secure data deduplication , 2008, StorageSS '08.

[4]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[5]  Tao Jiang,et al.  Towards Efficient Fully Randomized Message-Locked Encryption , 2016, ACISP.

[6]  Ku-Young Chang,et al.  Client‐Side Deduplication to Enhance Security and Reduce Communication Costs , 2017 .

[7]  Mihir Bellare,et al.  Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.

[8]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[9]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[10]  Fatos Xhafa,et al.  Secure Deduplication Storage Systems with Keyword Search , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[11]  Huaglory Tianfield Security issues in cloud computing , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[12]  Hyunsoo Yoon,et al.  Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage , 2014, FCC.

[13]  Junbeom Hur,et al.  A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems , 2017, ACM Comput. Surv..

[14]  Fuchun Guo,et al.  BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Alessandro Sorniotti,et al.  A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.