Efficient and Secure File Deduplication in Cloud Storage
نویسندگان
چکیده
Outsourcing to a cloud storage brings forth new challenges for the efficient utilization of computing resources as well as simultaneously maintaining privacy and security for the outsourced data. Data deduplication refers to a technique that eliminates redundant data on the storage and the network, and is considered to be one of the most-promising technologies that offers efficient resource utilization in the cloud computing. In terms of data security, however, deduplication obstructs applying encryption on the outsourced data and even causes a side channel through which information can be leaked. Achieving both efficient resource utilization and data security still remains open. This paper addresses this challenging issue and proposes a novel solution that enables data deduplication while also providing the required data security and privacy. We achieve this goal by constructing and utilizing equality predicate encryption schemes which allow to know only equivalence relations between encrypted data. We also utilize a hybrid approach for data deduplication to prevent information leakage due to the side channel. The performance and security analyses indicate that the proposed scheme is efficient to securely manage the outsourced data in the cloud computing. key words: cloud computing security, data deduplication, predicate encryption, online guessing attack
منابع مشابه
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
Cloud storage service is gaining popularity in recent years. Clientside deduplication is an effective approach to save bandwidth and storage, and adopted by many cloud storage services including Dropbox, MozyHome and Wuala. Security flaws, which may lead to private data leakage, in the existing client-side deduplication mechanism are found recently by Harnik et al. (S&P Magazine, ’10) and Halev...
متن کاملSolving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...
متن کاملAn Enhanced Multi-Layered Cryptosystem Based Secure and Authorized Deduplication Model in Cloud Storage System
Data deduplication is an important technique for eliminating redundant data. Instead of taking no. of same files, it store only single copy of file. In most organizations, storage system contains many pieces of duplicate data. For example, the same file may be saved in several different places by different users. Deduplication eliminates these extra copies by saving just one copy of the data an...
متن کاملA Review Paper on Hybrid Cloud Approach for Secure Authorized Data Deduplication
Cloud computing is best concept to handle big database as the world is moving towards digitization. The amount of digital data in the world is growing exponentially with time. Thus, employing storage optimization techniques is an essential requirement to large storage areas like cloud storage. Cloud computing is best concept to handle big datasets. Data de the best storage optimization techniqu...
متن کاملEfficient Cross user Deduplication In cloud Storage
Deduplication on record is a valuable primitive that gives a client to check the veracity of transferred documents and to effectively refresh the records in a cloud server. In spite of the fact that specialists have proposed numerous dynamic deduplication plots in single user situations, the issue in multi-client conditions has not been ascertained adequately. A handy multi-client distributed s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 97-D شماره
صفحات -
تاریخ انتشار 2014