Sensitive Cloud Data Deduplication with Data Dynamics

Article Preview

Abstract:

To solve the confliction of data encryption and deduplication, a hMAC-Dedup scheme based on homomorphic MAC is proposed. In the scheme, every file is encrypted by the block level encryption and a tag is generated from each encrypted block. In the PoW (Proofs of oWnership) protocol, homomorphic MAC is used to check whether the file to store is real, by operating on the file’s encrypted blocks and pre-computed tags. The hMAC-Dedup can avoid the security shortcomings brought by hash-as-a-proof and provide encryption protection. It is also extended to support data dynamics, which includes block modification, insertion and deletion.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6236-6240

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Proc. ICDCS'02, 2002: 617-624.

DOI: 10.1109/icdcs.2002.1022312

Google Scholar

[2] Wang Ke, Liu Chuanyi, Wang Chunlu. Research on Secure De-duplication based on Proxy-Reencryption[OL]. http: /www. paper. edu. cn.

Google Scholar

[3] Shai H., Danny H., Benny P., et al. Proofs of Ownership in Remote Storage Systems[C]. In: Proc. of the 18th ACM conference on Computer and communications security (CCS'11), New York, NY, USA: ACM Press, 2011: 491-500.

DOI: 10.1145/2046707.2046765

Google Scholar

[4] Xu Jia, Chang Ee-Chien, Zhou Jianying. Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage[R]. Cryptology ePrint Archive, Report 2011/538, 2011. http: /eprint. iacr. org.

DOI: 10.1145/2484313.2484340

Google Scholar

[5] Keong Ng W., Wen Yonggang, Zhu Huafei. Private Data Deduplication Protocols in Cloud Storage[C]. In: Proc. of the 27th Annual ACM Symposium on Applied Computing (SAC'12), New York, NY, USA: ACM Press, 2012: 441-446.

DOI: 10.1145/2245276.2245361

Google Scholar

[6] WANG Lina, REN Zhengwei, YU Rongwei, et al. A Data Assured Deletion Approach Adapted for Cloud Storage[J]. Acta Electronica Sinica, 2012, 40(2): 266-272.

Google Scholar

[7] Chang Ee-Chien, Xu Jia. Remote Integrity Check with Dishonest Storage Server[C]. In: Proc. of ESORICS '08: European Symposium on Research in Computer Security: Computer Security. Berlin, Heidelberg: Springer-Verlag, 2008: 223–237.

DOI: 10.1007/978-3-540-88313-5_15

Google Scholar