Browse > Article
http://dx.doi.org/10.3745/JIPS.04.0143

Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter  

Yan, Xi-ai (Dept. of Information Technology, Hunan Police Academy)
Shi, Wei-qi (Dept. of Information Technology, Hunan Police Academy)
Tian, Hua (Dept. of Information Technology, Hunan Police Academy)
Publication Information
Journal of Information Processing Systems / v.15, no.6, 2019 , pp. 1265-1276 More about this Journal
Abstract
Data deduplication is a common method to improve cloud storage efficiency and save network communication bandwidth, but it also brings a series of problems such as privacy disclosure and dictionary attacks. This paper proposes a secure deduplication scheme for cloud storage based on Bloom filter, and dynamically extends the standard Bloom filter. A public dynamic Bloom filter array (PDBFA) is constructed, which improves the efficiency of ownership proof, realizes the fast detection of duplicate data blocks and reduces the false positive rate of the system. In addition, in the process of file encryption and upload, the convergent key is encrypted twice, which can effectively prevent violent dictionary attacks. The experimental results show that the PDBFA scheme has the characteristics of low computational overhead and low false positive rate.
Keywords
Bloom Filter; Cloud Storage; Data Deduplication; Privacy Protection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cisco Global cloud index [Online]. Available: https://www.cisco.com/c/dam/assets/sol/sp/gci/global-cloud-index-infographic.html.
2 J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," in Proceedings 22nd International Conference on Distributed Computing Systems, Vienna, Austria, 2002, pp. 617-624.
3 M. Li, C. Qin, and P. P. Lee, "CDStore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal," in Proceedings of 2015 USENIX Annual Technical Conference, Santa Clara, CA, 2015, pp. 111-124.
4 J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, "A secure data deduplication scheme for cloud storage," in Financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 99-118.
5 P. Puzio, R. Molva, M. Onen, and S. Loureiro, "PerfectDedup: secure data deduplication," in Data Privacy Management, and Security Assurance. Cham: Springer, 2015, pp. 150-166.
6 S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proceedings of the 18th ACM Conferenceon Computer and Communications Security, Chicago, IL, 2011, pp. 491-500.
7 R. Di Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication," in Proceedings of the 7th ACM Symposium on Information, Computerand Communications Security, Seoul, Korea, 2012, pp. 81-82.
8 J. Blasco, R. Di Pietro, A. Orfila, and A. Sorniotti, "A tunable proof of ownership scheme for deduplication using bloom filters," in Proceedings of 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, 2014, pp. 481-489.
9 Z. Liu and Z. Yang, "Efficient and secure deduplication cloud storage scheme based on proof of ownership by Bloom filter," Journal of Computer Applications, vol. 37, no. 3, pp. 766-770, 2017.
10 W. Li, D. F. Zhang, K. Huang, and K. Xie, "Accurate multi-dimension counting Bloom filter for big data processing," Chinese Journal of Electronics, vol. 43, no. 4, pp. 652-657, 2015.
11 K. Xie and W. Shi, "PPIBF: a privacy preservation invertible Bloom filter," Computer Engineering & Science, vol. 39, no. 6, pp. 1104-1111, 2017.
12 J. Zhao, Z. Hu, B. Xiong, and K. Li, "Accelerating packet classification with counting bloom filters for virtual openflow switching," China Communications, vol. 15, no. 10, pp. 117-128, 2018.   DOI
13 Y. Li and Z. Xiang, "Ciphertext retrieval ranking method based on counting Bloom filter," Journal of Computer Applications, vol. 38, no. 9, pp. 2554-2559, 2018
14 E. Zhang and G. Jin, "Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and Bloom filter," Journal of Computer Applications, vol. 38, no. 8, pp. 2256-2260, 2018.
15 J. Xu, E. C. Chang, and J. Zhou, "Weak leakage-resilient client-side deduplication of encrypted data in cloud storage," in Proceedings of the 8th ACM SIGSAC SymposiumonInformati on, Computerand Communications Security, Hangzhou, China, 2013, pp. 195-206.
16 P. Anderson and L. Zhang, "Fast and secure laptop backups with encrypted de-duplication," in Proceedings of the 24th Large Installation System Administration(LISA), San Jose, CA, 2010.
17 S. Dharmapurikar, P. Krishnamurthy, and D. E. Taylor, "Longest prefix matching using bloom filters," IEEE/ACM Transactions on Networking, vol.14, no. 2, pp. 397-409, 2006.   DOI
18 C. M. Tseng, J. R. Ciou, and T. J. Liu, "A cluster-based data de-duplication technology," in Proceedings of the 2nd International Symposium on Computing and Networking, Shizuoka, Japan, 2014, pp. 226-230.
19 J. Xiong, Y. Zhang, F. Li, S. Li, J. Ren, and Z. Yao, "Research progress on secure data deduplication in cloud," Journal on Communications, vol.37, no. 11, pp. 169-180, 2016.
20 L. Gonzalez-Manzano and A. Orfila, "An efficient confidentiality-preserving proof of ownership for deduplication," Journal of Network and Computer Applications, vol. 50, pp. 49-59, 2015.   DOI