Secure Image Deduplication in Cloud Storage

With the great development of cloud computing in recent years, the explosive increasing of image data, the mass of information storage, and the application demands for high availability of data, network backup is facing an unprecedented challenge. Image deduplication technology is proposed to reduce the storage space and costs. To protect the confidentiality of the image, the notion of convergent encryption has been proposed. In the deduplication system, the image will be encrypted/ decrypted with a convergent encryption key which is derived by computing the hash value of the image content. It means that identical image copies will generate the same ciphertext, which used to check the duplicate image copy. Security analysis makes sure that this system is secure.

[1]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[2]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[3]  Cezary Dubnicki,et al.  HydraFS: A High-Throughput File System for the HYDRAstor Content-Addressable Storage System , 2010, FAST.

[4]  João Pedro Sousa,et al.  Authentication, authorisation and auditing for ubiquitous computing: a survey and vision , 2011, Int. J. Space Based Situated Comput..

[5]  Xuan Li,et al.  A secure cloud storage system supporting privacy-preserving fuzzy deduplication , 2016, Soft Comput..

[6]  John Gantz,et al.  The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .

[7]  Val Henson,et al.  An Analysis of Compare-by-hash , 2003, HotOS.

[8]  William J. Bolosky,et al.  Single instance storage in Windows® 2000 , 2000 .

[9]  Dan Feng,et al.  DAM: A DataOwnership-Aware Multi-layered De-duplication Scheme , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.

[10]  Fang Liu,et al.  AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment , 2011, 2011 IEEE International Conference on Cluster Computing.

[11]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  Ian Pratt,et al.  Proceedings of the General Track: 2004 USENIX Annual Technical Conference , 2004 .

[13]  Christopher Chute,et al.  The Diverse and Exploding Digital Universe , 2011 .

[14]  Miguel Castro,et al.  Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.

[15]  Alfredo De Santis,et al.  Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[16]  William J. Bolosky,et al.  Single Instance Storage in Windows , 2000 .

[17]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[18]  Madoka Yuriyama,et al.  Integrated cloud computing environment with IT resources and sensor devices , 2011, Int. J. Space Based Situated Comput..

[19]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[20]  Irfan Ahmad,et al.  Decentralized Deduplication in SAN Cluster File Systems , 2009, USENIX Annual Technical Conference.

[21]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[22]  Bruno Carpentieri,et al.  A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[23]  Mahadev Satyanarayanan,et al.  Using content addressable techniques to optimize client-server systems , 2007 .