Skip to main content
Top
Published in: Mobile Networks and Applications 4/2021

07-01-2020

Secure Encrypted Data Deduplication Based on Data Popularity

Authors: Yunlong He, Hequn Xian, Liming Wang, Shuguang Zhang

Published in: Mobile Networks and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult. Current solutions rely heavily on trusted third parties, and does not recognize the popularity of data, resulting in unsatisfying security and efficiency. A secure encrypted data deduplication scheme based on data popularity is proposed. Tags are calculated via bilinear mapping to determine whether different encrypted data originate from the same plaintext. Ciphertext policy attribute-based encryption is used to protect the tags. A secure key delivery scheme is designed to pass the data encryption key from an initial data uploader to subsequent uploaders via the cloud server in an offline manner. The cloud server can perform deduplication without the assistance of any online third party. Security analysis and simulation experiments are provided, proving the practicability and efficiency of the proposed scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134:26–39CrossRef Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134:26–39CrossRef
2.
go back to reference Yuan J, Chucheng Y (2013) Secure and constant cost public cloud storage auditing with deduplication. Commun Netw Secur IEEE:145–153 Yuan J, Chucheng Y (2013) Secure and constant cost public cloud storage auditing with deduplication. Commun Netw Secur IEEE:145–153
3.
go back to reference Fu Y, Xiao N, Liu F (2012) Research and development on key techniques of data deduplication. J Comput Res Dev 49:12–20 Fu Y, Xiao N, Liu F (2012) Research and development on key techniques of data deduplication. J Comput Res Dev 49:12–20
4.
go back to reference Ao L, Shu J, Li M (2010) Data deduplication techniques. J Softw 21:916–929CrossRef Ao L, Shu J, Li M (2010) Data deduplication techniques. J Softw 21:916–929CrossRef
6.
go back to reference Meyer, DT, Bolosky, WJ (2012) A Study of Practical Deduplication. ACM Trans. Storage 7(4):1–20 Meyer, DT, Bolosky, WJ (2012) A Study of Practical Deduplication. ACM Trans. Storage 7(4):1–20
7.
go back to reference Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in aserverless distributed file system. In: International Conference on Distributed Computing System, IEEE, pp 617–624 Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in aserverless distributed file system. In: International Conference on Distributed Computing System, IEEE, pp 617–624
8.
go back to reference Seetharamulu U (2015) Cloud storage using convergent encryption technique. Int J Appl Eng Res 10:30–36 Seetharamulu U (2015) Cloud storage using convergent encryption technique. Int J Appl Eng Res 10:30–36
9.
go back to reference Puzio P, Molva R, Onen M (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE international Conference on Cloud Computing Technology & Science, pp 363–370 Puzio P, Molva R, Onen M (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE international Conference on Cloud Computing Technology & Science, pp 363–370
10.
go back to reference Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: EUROCRYPT, volume 7881 of lncs, Springer, pp 296–312 Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: EUROCRYPT, volume 7881 of lncs, Springer, pp 296–312
11.
go back to reference Stanek J, Sorniotti A, Androulak E (2014) A secure data deduplication scheme for cloud storage. In: Christin N, Safavi-Naini, R eds, FC, volume 8437 of LNCS, Springer, pp 99–118 Stanek J, Sorniotti A, Androulak E (2014) A secure data deduplication scheme for cloud storage. In: Christin N, Safavi-Naini, R eds, FC, volume 8437 of LNCS, Springer, pp 99–118
12.
go back to reference Li J, Li J, Xie D et al (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396MathSciNetCrossRef Li J, Li J, Xie D et al (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396MathSciNetCrossRef
13.
go back to reference Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd Usenix Conference on Security, USENIX Association, pp 179–194 Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd Usenix Conference on Security, USENIX Association, pp 179–194
14.
go back to reference Puzio P, Molva R, Önen M, Loureiro S (2015) PerfectDedup: secure data deduplication. Volume 9481 of the series Lecture Notes in Computer Science pages. pp 150–166 Puzio P, Molva R, Önen M, Loureiro S (2015) PerfectDedup: secure data deduplication. Volume 9481 of the series Lecture Notes in Computer Science pages. pp 150–166
15.
go back to reference Jian Liu NA, Pinkas B (2015) Secure deduplication of encrypted data without additional independent servers. ACM Sigsac Conference on Computer and Communications Security ACM, pp 874–885 Jian Liu NA, Pinkas B (2015) Secure deduplication of encrypted data without additional independent servers. ACM Sigsac Conference on Computer and Communications Security ACM, pp 874–885
16.
go back to reference Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Advances in crypto’04. Springer-Verlag, Berlin, pp 41–55 Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Advances in crypto’04. Springer-Verlag, Berlin, pp 41–55
18.
go back to reference Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 321–334
19.
go back to reference Cheung N (2007) Provably secure ciphertext policy ABE. In: ACM conference on Computer and Communications Security (ACM CCS), pp 456–465 Cheung N (2007) Provably secure ciphertext policy ABE. In: ACM conference on Computer and Communications Security (ACM CCS), pp 456–465
20.
go back to reference Cui H, Deng RH, Li Y (2016) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5:1–1 Cui H, Deng RH, Li Y (2016) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5:1–1
21.
go back to reference Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering 28(11):3113–3125 Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering 28(11):3113–3125
23.
go back to reference Loukides O (1997) Programming with GNU SoftWare. O’Reilly & Associates, pp 350–359 Loukides O (1997) Programming with GNU SoftWare. O’Reilly & Associates, pp 350–359
25.
go back to reference Hu X, Qin Z, Zhang H, Hao G (2009) Research and improved implementation of AES algorithm in OpenSSL. Control Autom:83–85 Hu X, Qin Z, Zhang H, Hao G (2009) Research and improved implementation of AES algorithm in OpenSSL. Control Autom:83–85
Metadata
Title
Secure Encrypted Data Deduplication Based on Data Popularity
Authors
Yunlong He
Hequn Xian
Liming Wang
Shuguang Zhang
Publication date
07-01-2020
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 4/2021
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01504-3

Other articles of this Issue 4/2021

Mobile Networks and Applications 4/2021 Go to the issue