Browse > Article
http://dx.doi.org/10.9717/kmms.2018.21.8.909

Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage  

Park, Ji Sun (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University)
Shin, Sang Uk (Dept. of IT Convergence and Application Eng., Pukyong National University)
Publication Information
Abstract
Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.
Keywords
Secure Deduplication; Brute-Force Attack; Convergent Encryption; Cloud Computing;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W. Lou, "Secure and Efficient Cloud Data Deduplication With Randomized Tag," IEEE Transactions on Information Forensics and Security, Vol. 12, No. 3, pp. 532-543, 2017.   DOI
2 K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, "Deypos: Deduplicatable Dynamic Proof of Storage for Multi-user Environments," IEEE Transactions on Computers, Vol. 65, No. 12, pp. 3631-3645, 2016.   DOI
3 Cisco Global Cloud Index: Forecast and Methodology, https://www.cisco.com/c/dam/m/en_us/service-provider/ ciscoknowledgenetwork/files/622_11_15-16-Cisco_GCI_CKN_2015-2020_AMER_EMEAR_NOV2016.pdf (accessed Jun., 18, 2018).
4 C. Kim, D. Kim, H. Kim, Y. Kim, and D. Seo, "Torus Network Based Distributed Storage System for Massive Multimedia Contents," Journal of Korea Multimedia Society, Vol. 19, No. 8, pp. 1487-1497, 2016.   DOI
5 Z. Yan, W. Ding, and H. Zhu, "A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud," Proceeding of International Conference on Algorithms and Architectures for Parallel Processing, Vol. 9530, pp. 547-561, 2015.
6 J. Hur, D. Koo, Y. Shin, and K. Kang, "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage," IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 11, pp. 3113-3125, 2016.   DOI
7 Z. Yan, W. Ding, X. Yu, H. Zhu, and R.H. Deng, "Deduplication on Encrypted Big Data in Cloud," IEEE Transactions on Big Data, Vol. 2, No. 2, pp. 138-150, 2016.   DOI
8 C.M. Yu, XDedup: Efficient Provably-secure Cross-user Chunk-level Client-side Deduplicated Cloud Storage of Encrypted Data, International Association for Cryptologic Research Cryptology ePrint Archive: Report 2016/1041, 2016.
9 D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side Channels in Cloud Services: Deduplication in Cloud Storage," IEEE Security and Privacy, Vol. 8, No. 6, pp. 40-47, 2010.
10 S. Keelveedhi, M. Bellare, and T. Ristenpart, "DupLESS: Server-aided Encryption for Deduplicated Storage," Proceeding of the 22nd Unix Users Group Security Symposium, pp. 179-194, 2013.
11 J. Liu, N. Asokan, and B. Pinkas, "Secure Deduplication of Encrypted Data without Additional Independent Servers," Proceeding of the 22nd Association for Computing Machinery Special Interest Group on Security, Audit and Control Conference on Computer and Communications Security, pp. 874-885, 2015.
12 S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems," Proceeding of the 18th Association for Computing Machinery Conference on Computer and Communications Security, pp. 491-500, 2011.
13 M.W. Storer, K. Greenan, D.D. Long, and E.L. Miller, "Secure Data Deduplication," Proceeding of the 4th Association for Computing Machinery International Workshop on Storage Security and Survivability, pp. 1-10, 2008.