Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.1.123

Privacy Preserving Source Based Deduplication In Cloud Storage  

Park, Cheolhee (Kongju National University)
Hong, Dowon (Kongju National University)
Seo, Changho (Kongju National University)
Chang, Ku-Young (ETRI)
Abstract
In cloud storage, processing the duplicated data, namely deduplication, is necessary technology to save storage space. Users who store sensitive data in remote storage want data be encrypted. However Cloud storage server do not detect duplication of conventionally encrypted data. To solve this problem, Convergent Encryption has been proposed. But it inherently have weakness due to brute-force attack. On the other hand, to save storage space as well as save bandwidths, client-side deduplication have been applied. Recently, various client-side deduplication technology has been proposed. However, this propositions still cannot solve the security problem. In this paper, we suggest a secure source-based deduplication technology, which encrypt data to ensure the confidentiality of sensitive data and apply proofs of ownership protocol to control access to the data, from curious cloud server and malicious user.
Keywords
Cloud Storage; Deduplication; Privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 DropBox, http://www.dropbox.com
2 Mozy, http://www.mozy.com
3 google-Drive, http://www.drive.google.com
4 Douceur, John R., et al. "Reclaiming space from duplicate files in a serverless distributed file system." Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on. IEEE, pp. 617-624, 2002.
5 Bellare, Mihir, Sriram Keelveedhi, and Thomas Ristenpart. "DupLESS: server-aided encryption for deduplicated storage." Proceedings of the 22nd USENIX conference on Security. USENIX Association, pp. 179-194, August. 2013.
6 Halevi, Shai, et al. "Proofs of ownership in remote storage systems." Proceedings of the 18th ACM conference on Computer and communications security. ACM, pp. 491-500, October. 2011.
7 Kaaniche, Nesrine, and Maryline Laurent. "A Secure Client Side Deduplication Scheme in Cloud Storage Environments." New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. IEEE, pp. 1-7, March. 2014.
8 Camenisch, Jan, and Gregory Neven. "Simulatable adaptive oblivious transfer." Advances in Cryptology-EUROCRYPT 2007. Springer Berlin Heidelberg, pp. 573-590, 2007.
9 Naor, Moni, and Omer Reingold. "Number-theoretic constructions of efficient pseudo-random functions." Journal of the ACM (JACM) 51.2, pp. 231-262, 2004.   DOI
10 Merkle, Ralph C. "A certified digital signature." Advances in Cryptology-CRYPTO'89 Proceedings. Springer New York, pp. 218-238, January. 1990.
11 Harnik, Danny, Benny Pinkas, and Alexandra Shulman-Peleg. "Side channels in cloud services: Deduplication in cloud storage." Security & Privacy, IEEE 8.6, pp. 40-47, 2010.