Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.1.83

Secure and Efficient Client-side Deduplication for Cloud Storage  

Park, Kyungsu (Graduate School of Information Security, Korea University)
Eom, Ji Eun (Graduate School of Information Security, Korea University)
Park, Jeongsu (Graduate School of Information Security, Korea University)
Lee, Dong Hoon (Graduate School of Information Security, Korea University)
Abstract
Deduplication, which is a technique of eliminating redundant data by storing only a single copy of each data, provides clients and a cloud server with efficiency for managing stored data. Since the data is saved in untrusted public cloud server, however, both invasion of data privacy and data loss can be occurred. Over recent years, although many studies have been proposed secure deduplication schemes, there still remains both the security problems causing serious damages and inefficiency. In this paper, we propose secure and efficient client-side deduplication with Key-server based on Bellare et. al's scheme and challenge-response method. Furthermore, we point out potential risks of client-side deduplication and show that our scheme is secure against various attacks and provides high efficiency for uploading big size of data.
Keywords
Cloud storage; Client-side deduplication; Data privacy; Poison attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Dutch and L. Freeman. "Understanding data deduplication ratios." SNIA Data Management Forum, Jun. 2008.
2 "DropBox, Hacked on client accounts", http://www.bloter.net/archives/121266
3 D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side channels in cloud services : Deduplication in cloud storage," IEEE Security and Privacy Magazine, vol.8, pp. 40-47, Nov. 2010.
4 J. Xu, E. C. Chang, and J. Zhou. "Weak Leakage-Resilient client-side deduplication of encrypted data in cloud storage." ASIA CCS, pp. 195-206, May. 2013.
5 M. Green, S. Hohenberger, and B. Waters, "Outsourcing the decryption of abe ciphertexts," Proc. USENIX Conf. Security (SEC' 11), Aug. 2011.
6 J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system." Proc. Int'l Conf. Distributed Computing Systems (ICDCS' 02), pp. 617-624, Jul. 2002.
7 M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. "The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme." J. Cryptology, vol. 16, no.3, pp. 185-215, Jun. 2003.   DOI
8 M. Bellare, and S. Keelveedhi. "DupLess : Server-aided encryption for deduplicated storage." Proc. USENIX conf. Security (SEC' 13), pp. 179-194, Aug. 2013.
9 S. Halevi, D. Harnik, B. Pinkas, A. Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems," Proc. 18th ACM. Conf. Computer and Communications Security (CCS '11), ACM Press, pp. 491-500, Oct. 2011.
10 D. Russell, "Data deduplication will be even bigger in 2010," Gartner, Feb. 2010.
11 Y. Shin, and K. Kim, "Efficient and Secure File Deduplication in Cloud Storage," IEICE TRANS. INF. & SYST., Vol. E97-D, NO.2, pp. 184-197, Feb. 2014.   DOI
12 D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," In Proceedings of Eurocrypt '04, LNCS Vol. 3027, pp. 506-522, Springer-Verlag, May. 2004.
13 K. Park, J. E. Eom, D. H. Lee, "An analysis of Shin et al's scheme for secure deduplication," Korea Institute of Information Security & Cryptology CISC-S, pp. 50, Jun, 2014.