Transparent Data Deduplication in the Cloud

作者: Frederik Armknecht , Jens-Matthias Bohli , Ghassan O. Karame , Franck Youssef

DOI: 10.1145/2810103.2813630

关键词:

摘要: Cloud storage providers such as Dropbox and Google drive heavily rely on data deduplication to save costs by only storing one copy of each uploaded file. Although recent studies report that whole file can achieve up 50% reduction, users do not directly benefit from these savings-as there is no transparent relation between effective the prices offered users. In this paper, we propose a novel solution, ClearBox, which allows service provider transparently attest its customers patterns (encrypted) it storing. By doing so, ClearBox enables cloud verify space their occupying in cloud, consequently check whether they qualify for benefits price reductions, etc. secure against malicious rational provider, ensures files be accessed legitimate owners. We evaluate prototype implementation using both Amazon S3 back-end storage. Our findings show our solution works with APIs provided existing without any modifications achieves comparable performance solutions.

参考文章(34)
Helger Lipmaa, Secure Accumulators from Euclidean Rings without Trusted Setup Applied Cryptography and Network Security. pp. 224- 240 ,(2012) , 10.1007/978-3-642-31284-7_14
Jan Stanek, Alessandro Sorniotti, Elli Androulaki, Lukas Kencl, A Secure Data Deduplication Scheme for Cloud Storage Financial Cryptography and Data Security. pp. 99- 118 ,(2014) , 10.1007/978-3-662-45472-5_8
Hovav Shacham, Brent Waters, Compact Proofs of Retrievability international conference on the theory and application of cryptology and information security. pp. 90- 107 ,(2008) , 10.1007/978-3-540-89255-7_7
Thomas Ristenpart, Mihir Bellare, Sriram Keelveedhi, DupLESS: server-aided encryption for deduplicated storage usenix security symposium. pp. 179- 194 ,(2013)
Lan Nguyen, Accumulators from Bilinear Pairings and Applications Lecture Notes in Computer Science. pp. 275- 292 ,(2005) , 10.1007/978-3-540-30574-3_19
Jiangtao Li, Ninghui Li, Rui Xue, Universal Accumulators with Efficient Nonmembership Proofs Applied Cryptography and Network Security. pp. 253- 269 ,(2007) , 10.1007/978-3-540-72738-5_17
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Niko Barić, Birgit Pfitzmann, Collision-free accumulators and fail-stop signature schemes without trees theory and application of cryptographic techniques. pp. 480- 494 ,(1997) , 10.1007/3-540-69053-0_33
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg, Constant-size commitments to polynomials and their applications international conference on the theory and application of cryptology and information security. pp. 177- 194 ,(2010) , 10.1007/978-3-642-17373-8_11
Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage ieee symposium on security and privacy. ,vol. 8, pp. 40- 47 ,(2010) , 10.1109/MSP.2010.187