Secure and efficient proof of ownership for deduplicated cloud storage

作者: Jay Dave , Parvez Faruki , Vijay Laxmi , Bruhadeshwar Bezawada , Manoj Gaur

DOI: 10.1145/3136825.3136889

关键词: Cloud computingData compressionComputer scienceComputer data storageCloud storageData deduplicationDatabaseMathematical proofVolume (compression)Data management

摘要: The rapid increment in volume of outsourced data has raised an issue management for Cloud Storage Server. To solve this issue, Deduplication, a compression technique was introduced which avoids duplicate storage. However, Deduplication is vulnerable to malicious access genuine Clients' files. An adversary can get file by learning small piece knowledge about the file. In paper, we propose secure and efficient Proof Ownership Deduplicated Storage. Our approach employs random matrix based challenges retrieved from We evaluate security efficiency our theoretical proofs experimental results.

参考文章(32)
Thomas H. Cormen, Ronald L. Rivest, Charles E. Leiserson, Clifford Stein, Introduction to Algorithms, third edition ,(2009)
Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 2643- 2652 ,(2015) , 10.1109/TIFS.2015.2470221
Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro, PerfectDedup: Secure Data Deduplication Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481. pp. 150- 166 ,(2015) , 10.1007/978-3-319-29883-2_10
Chao Yang, Jian Ren, Jianfeng Ma, Provable ownership of files in deduplication cloud storage Security and Communication Networks. ,vol. 8, pp. 2457- 2468 ,(2015) , 10.1002/SEC.784
Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage ieee symposium on security and privacy. ,vol. 8, pp. 40- 47 ,(2010) , 10.1109/MSP.2010.187
Jia Xu, Ee-Chien Chang, Jianying Zhou, Weak leakage-resilient client-side deduplication of encrypted data in cloud storage computer and communications security. pp. 195- 206 ,(2013) , 10.1145/2484313.2484340
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef, Transparent Data Deduplication in the Cloud computer and communications security. pp. 886- 900 ,(2015) , 10.1145/2810103.2813630
Roberto Di Pietro, Alessandro Sorniotti, Boosting efficiency and security in proof of ownership for deduplication computer and communications security. pp. 81- 82 ,(2012) , 10.1145/2414456.2414504
Nesrine Kaaniche, Maryline Laurent, A Secure Client Side Deduplication Scheme in Cloud Storage Environments new technologies, mobility and security. pp. 1- 7 ,(2014) , 10.1109/NTMS.2014.6814002
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, Proofs of ownership in remote storage systems Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 491- 500 ,(2011) , 10.1145/2046707.2046765