Browse > Article

Privacy Preserving source Based Deuplication Method  

Nam, Seung-Soo (공주대학교 융합과학과)
Seo, Chang-Ho (공주대학교 융합과학과)
Lee, Joo-Young (전자통신연구원)
Kim, Jong-Hyun (전자통신연구원)
Kim, Ik-Kyun (전자통신연구원)
Publication Information
Smart Media Journal / v.4, no.4, 2015 , pp. 33-38 More about this Journal
Abstract
Cloud storage server do not detect duplication of conventionally encrypted data. To solve this problem, Convergent Encryption has been proposed. Recently, various client-side deduplication technology has been proposed. However, this propositions still cannot solve the security problem. In this paper, we suggest a secure source-based deduplication technology, which encrypt data to ensure the confidentiality of sensitive data and apply proofs of ownership protocol to control access to the data, from curious cloud server and malicious user.
Keywords
Deduplication; Privacy; Data encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kaaniche, Nesrine, M, Laurent, "A Secure Client Side Deduplication Scheme in Cloud Storage Environments," New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, lEEE, 2014.
2 Douceur, R. John, "Reclaiming space from duplicate files in a serverless distributed file system," Distributed Computing Systems, 2002, Proceedings, 22nd International Conference on, IEEE, 2002.
3 Camenisch, Jan, G. Neven, "Simulatable adaptive oblivious transfer," Advances in Cryptology-EUROCRYPT, Springer Berlin Heidelberg, 2007, 573-590.
4 Naor, Moni, O. Reingold. "Number-theoretic constructions of efficient pseudo-random functions," Journal of the ACM (JACM) 51,2 (2004): 231-262.   DOI
5 Bellare, Mihir, S. Keelveedhi, T. Ristenpart, "DupLESS: server-aided encryption for deduplicated storage," Proceedings of the 22nd USENIX conference on Security, USENIX Association, 2013.
6 Halevi, Shai, "Proofs of ownership in remote storage systems," Proceedings of the 18th ACM conference on Computer and communications security, ACM, 2011.
7 Merkle, C. Ralph, "A certified digital signature," Advances in Cryptology-CRYPTO'89 Proceedings, Springer New York, 1990.