Skip to main content
Erschienen in: Mobile Networks and Applications 4/2021

07.01.2020

Secure Encrypted Data Deduplication Based on Data Popularity

verfasst von: Yunlong He, Hequn Xian, Liming Wang, Shuguang Zhang

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult. Current solutions rely heavily on trusted third parties, and does not recognize the popularity of data, resulting in unsatisfying security and efficiency. A secure encrypted data deduplication scheme based on data popularity is proposed. Tags are calculated via bilinear mapping to determine whether different encrypted data originate from the same plaintext. Ciphertext policy attribute-based encryption is used to protect the tags. A secure key delivery scheme is designed to pass the data encryption key from an initial data uploader to subsequent uploaders via the cloud server in an offline manner. The cloud server can perform deduplication without the assistance of any online third party. Security analysis and simulation experiments are provided, proving the practicability and efficiency of the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134:26–39CrossRef Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Netw Comput Appl 134:26–39CrossRef
2.
Zurück zum Zitat Yuan J, Chucheng Y (2013) Secure and constant cost public cloud storage auditing with deduplication. Commun Netw Secur IEEE:145–153 Yuan J, Chucheng Y (2013) Secure and constant cost public cloud storage auditing with deduplication. Commun Netw Secur IEEE:145–153
3.
Zurück zum Zitat Fu Y, Xiao N, Liu F (2012) Research and development on key techniques of data deduplication. J Comput Res Dev 49:12–20 Fu Y, Xiao N, Liu F (2012) Research and development on key techniques of data deduplication. J Comput Res Dev 49:12–20
4.
Zurück zum Zitat Ao L, Shu J, Li M (2010) Data deduplication techniques. J Softw 21:916–929CrossRef Ao L, Shu J, Li M (2010) Data deduplication techniques. J Softw 21:916–929CrossRef
6.
Zurück zum Zitat Meyer, DT, Bolosky, WJ (2012) A Study of Practical Deduplication. ACM Trans. Storage 7(4):1–20 Meyer, DT, Bolosky, WJ (2012) A Study of Practical Deduplication. ACM Trans. Storage 7(4):1–20
7.
Zurück zum Zitat Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in aserverless distributed file system. In: International Conference on Distributed Computing System, IEEE, pp 617–624 Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in aserverless distributed file system. In: International Conference on Distributed Computing System, IEEE, pp 617–624
8.
Zurück zum Zitat Seetharamulu U (2015) Cloud storage using convergent encryption technique. Int J Appl Eng Res 10:30–36 Seetharamulu U (2015) Cloud storage using convergent encryption technique. Int J Appl Eng Res 10:30–36
9.
Zurück zum Zitat Puzio P, Molva R, Onen M (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE international Conference on Cloud Computing Technology & Science, pp 363–370 Puzio P, Molva R, Onen M (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE international Conference on Cloud Computing Technology & Science, pp 363–370
10.
Zurück zum Zitat Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: EUROCRYPT, volume 7881 of lncs, Springer, pp 296–312 Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: EUROCRYPT, volume 7881 of lncs, Springer, pp 296–312
11.
Zurück zum Zitat Stanek J, Sorniotti A, Androulak E (2014) A secure data deduplication scheme for cloud storage. In: Christin N, Safavi-Naini, R eds, FC, volume 8437 of LNCS, Springer, pp 99–118 Stanek J, Sorniotti A, Androulak E (2014) A secure data deduplication scheme for cloud storage. In: Christin N, Safavi-Naini, R eds, FC, volume 8437 of LNCS, Springer, pp 99–118
12.
Zurück zum Zitat Li J, Li J, Xie D et al (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396MathSciNetCrossRef Li J, Li J, Xie D et al (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396MathSciNetCrossRef
13.
Zurück zum Zitat Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd Usenix Conference on Security, USENIX Association, pp 179–194 Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd Usenix Conference on Security, USENIX Association, pp 179–194
14.
Zurück zum Zitat Puzio P, Molva R, Önen M, Loureiro S (2015) PerfectDedup: secure data deduplication. Volume 9481 of the series Lecture Notes in Computer Science pages. pp 150–166 Puzio P, Molva R, Önen M, Loureiro S (2015) PerfectDedup: secure data deduplication. Volume 9481 of the series Lecture Notes in Computer Science pages. pp 150–166
15.
Zurück zum Zitat Jian Liu NA, Pinkas B (2015) Secure deduplication of encrypted data without additional independent servers. ACM Sigsac Conference on Computer and Communications Security ACM, pp 874–885 Jian Liu NA, Pinkas B (2015) Secure deduplication of encrypted data without additional independent servers. ACM Sigsac Conference on Computer and Communications Security ACM, pp 874–885
16.
Zurück zum Zitat Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Advances in crypto’04. Springer-Verlag, Berlin, pp 41–55 Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Advances in crypto’04. Springer-Verlag, Berlin, pp 41–55
18.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 321–334
19.
Zurück zum Zitat Cheung N (2007) Provably secure ciphertext policy ABE. In: ACM conference on Computer and Communications Security (ACM CCS), pp 456–465 Cheung N (2007) Provably secure ciphertext policy ABE. In: ACM conference on Computer and Communications Security (ACM CCS), pp 456–465
20.
Zurück zum Zitat Cui H, Deng RH, Li Y (2016) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5:1–1 Cui H, Deng RH, Li Y (2016) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5:1–1
21.
Zurück zum Zitat Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering 28(11):3113–3125 Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering 28(11):3113–3125
23.
Zurück zum Zitat Loukides O (1997) Programming with GNU SoftWare. O’Reilly & Associates, pp 350–359 Loukides O (1997) Programming with GNU SoftWare. O’Reilly & Associates, pp 350–359
25.
Zurück zum Zitat Hu X, Qin Z, Zhang H, Hao G (2009) Research and improved implementation of AES algorithm in OpenSSL. Control Autom:83–85 Hu X, Qin Z, Zhang H, Hao G (2009) Research and improved implementation of AES algorithm in OpenSSL. Control Autom:83–85
Metadaten
Titel
Secure Encrypted Data Deduplication Based on Data Popularity
verfasst von
Yunlong He
Hequn Xian
Liming Wang
Shuguang Zhang
Publikationsdatum
07.01.2020
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2021
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01504-3

Weitere Artikel der Ausgabe 4/2021

Mobile Networks and Applications 4/2021 Zur Ausgabe

Neuer Inhalt