Cloud Storage: A Review on Secure Deduplication and Issues

Data deduplication in cloud is gaining popularity among cloud users because it enables cloud users to reduce the storage costs and the network bandwidth costs. Many security and privacy issues exist in general deduplication techniques and various secure deduplication techniques have been proposed to keep the sensitive data secure. A diverse range of solutions has been proposed for secure deduplication, ownership challenge and deduplication in the cloud environment. In this article, deduplication systems are classified based on message dependent encryption, ownership and cloud architecture. Based on the classification, security risks and side channel attacks from inside and outside adversaries and potential problems in deduplication are explored. Each scheme is compared in terms of their security and efficiency. Finally, the challenges in existing deduplication systems in the cloud and future research directions and challenges are discussed.

[1]  Ugo Vaccaro,et al.  Compression and Complexity of SEQUENCES 1997 , 1997 .

[2]  Nesrine Kaaniche,et al.  A Secure Client Side Deduplication Scheme in Cloud Storage Environments , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[3]  Robert H. Deng,et al.  Deduplication on Encrypted Big Data in Cloud , 2016, IEEE Transactions on Big Data.

[4]  Yonggang Wen,et al.  Private data deduplication protocols in cloud storage , 2012, SAC '12.

[5]  Shouhuai Xu,et al.  Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.

[6]  Min Dai,et al.  Detecting Cache-Based Side Channel Attacks in the Cloud: An Approach with Cascade Detection Mode , 2014 .

[7]  Frederik Armknecht,et al.  Side Channels in Deduplication: Trade-offs between Leakage and Efficiency , 2016, AsiaCCS.

[8]  Alessandro Sorniotti,et al.  A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.

[9]  João Paulo,et al.  A Survey and Classification of Storage Deduplication Systems , 2014, ACM Comput. Surv..

[10]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[11]  Christoph Neumann,et al.  Improving the Resistance to Side-Channel Attacks on Cloud Storage Services , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[12]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[13]  Junbeom Hur,et al.  A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems , 2017, ACM Comput. Surv..

[14]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Pin Zhou,et al.  Demystifying data deduplication , 2008, Companion '08.

[16]  Ugo Vaccaro,et al.  Sequences II: Methods in Communication, Security, and Computer Science , 2011 .

[17]  Dutch T. Meyer,et al.  A study of practical deduplication , 2011, TOS.

[18]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[19]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[20]  Chao Yang,et al.  Provable ownership of files in deduplication cloud storage , 2015, Secur. Commun. Networks.

[21]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[22]  Kwangjo Kim,et al.  Differentially private client-side data deduplication protocol for cloud storage services , 2015, Secur. Commun. Networks.

[23]  Yiwei Thomas Hou,et al.  Modeling the side-channel attacks in data deduplication with game theory , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[24]  Dooho Choi,et al.  Privacy-preserving cross-user source-based data deduplication in cloud storage , 2012, 2012 International Conference on ICT Convergence (ICTC).

[25]  Han-Chieh Chao,et al.  Proof of ownership in deduplicated cloud storage with mobile device efficiency , 2015, IEEE Network.

[26]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[27]  P. L. Amitha,et al.  ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING , 2017 .

[28]  Darrell D. E. Long,et al.  Secure data deduplication , 2008, StorageSS '08.

[29]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[30]  Chao Yang,et al.  Provable Ownership of Encrypted Files in De-duplication Cloud Storage , 2015, Ad Hoc Sens. Wirel. Networks.

[31]  Tian Luo,et al.  CAFTL: A Content-Aware Flash Translation Layer Enhancing the Lifespan of Flash Memory based Solid State Drives , 2011, FAST.

[32]  Mauro Conti,et al.  RARE: Defeating side channels based on data-deduplication in cloud storage , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[33]  Chuanyi Liu,et al.  DR-Cloud: Multi-cloud based disaster recovery service , 2014 .

[34]  Mihir Bellare,et al.  Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.