Browse > Article
http://dx.doi.org/10.4218/etrij.17.0116.0039

Client-Side Deduplication to Enhance Security and Reduce Communication Costs  

Kim, Keonwoo (Hyper-connected Communication Research Laboratory, ETRI)
Youn, Taek-Young (Hyper-connected Communication Research Laboratory, ETRI)
Jho, Nam-Su (Hyper-connected Communication Research Laboratory, ETRI)
Chang, Ku-Young (Hyper-connected Communication Research Laboratory, ETRI)
Publication Information
ETRI Journal / v.39, no.1, 2017 , pp. 116-123 More about this Journal
Abstract
Message-locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client-side contributions of MLE, however, are vulnerable to a poison attack, and server-side MLE schemes require large bandwidth consumption. In this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.
Keywords
Deduplication; Security; Poison attack; Duplicate-faking attack; Erasure attack; Communication; Computation; MLE;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Li et al., "Secure Deduplication with Dfficient and Reliable Convergent Key Management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, June 2014, pp. 1615-1625.   DOI
2 M. Storer et al., "Secure Data Deduplication," Proc. ACM Int. Workshop Storage Security Survivability, Alexandria, GA, USA, Oct. 31, 2008, pp. 1-10.
3 Y. Shin et al., "Efficient and Secure File Deduplication in Cloud Storage," IEICE Trans. Inform. Syst., vol. E97-D, no. 2, 2014, pp. 184-197.   DOI
4 J. Xu, E. Chang, and J. Zhou, "Weak Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage," Proc. ACM SIGSAC Symp. Inform., Comput., Commun. Security, Hangzhou, China, May 8-10, 2013, pp. 195-206.
5 N. Kaaniche and M. Laurent, "A Secure Client Side Deduplication Scheme in Cloud Storage Environments," Proc. Int. Conf. New Technol., Mobility Security, Dubai, United Arab Emirates, Mar. 30-Apr. 2, 2014, pp. 1-7.
6 J.R. Douceur et al., "Reclaiming Space from Duplicate Files in a Serverless Distributed File System," Proc. Int. Conf. Distr. Comput. Syst., Vienna, Austria, July 2-5, 2002, pp. 617-624.
7 D. Harnik, B. Pinkas, and A. Shulman Peleg, "Side Channels in Cloud Services: Deduplication in Cloud Storage," IEEE Security Privacy, vol. 8, no. 6, Dec. 2010, pp. 40-47.
8 S. Halevi et al., "Proofs of Ownership in Remote Storage Systems," Proc. ACM Conf. Comput. Commun. Security, Chicago, IL, USA, Oct. 17-22, 2011, pp. 491-500.
9 M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-Locked Encryption and Secure Deduplication," Adv. Cryptology - Eurocrypt, Athens, Greece, May 2013, pp. 296-312.
10 M. Bellare, S. Keelveedhi, and T. Ristenpart, "DupLESS: Server-Aided Encryption for Deduplicated Storage," Proc. USENIX Conf. Security, Washington, DC, USA, Aug. 14-16, 2013, pp. 179-194.