Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage

نویسندگان

  • Jia Xu
  • Ee-Chien Chang
  • Jianying Zhou
چکیده

Cloud storage service is gaining popularity in recent years. Clientside deduplication is an effective approach to save bandwidth and storage, and adopted by many cloud storage services including Dropbox, MozyHome and Wuala. Security flaws, which may lead to private data leakage, in the existing client-side deduplication mechanism are found recently by Harnik et al. (S&P Magazine, ’10) and Halevi et al. (CCS ’11). Halevi et al. identified an important security issue in client-side deduplication which leads to leakage of private users’ files to outside attackers, and addressed this issue by constructing schemes which they called proofs of ownership (PoW). In a proof of ownership scheme, any owner of the same file F can prove to the cloud storage that he/she owns file F in a robust and efficient way, even if a certain amount of arbitrary information about file F is leaked. In this paper, we make two main contributions: • We construct a hash function Hk : {0, 1} → {0, 1} with time complexity in O(M + L) and memory complexity in O(1), which is non-linear and provably pairwise-independent in the random oracle model. We apply the constructed hash function to obtain a proof of ownership scheme, which is provably secure w.r.t. any distribution of input file with sufficient min-entropy, in the random oracle model. In contrast, the PoW scheme (the last and the most practical construction) in Halevi et al. is provably secure w.r.t. only a particular type of distribution (they call it a generalization of “block-fixing” distribution) of input file with sufficient min-entropy, in the random oracle model. The constructed hash function may have independent interest. • We propose the first (to the best of our knowledge) solution to support cross-user client-side deduplication over encrypted data in the leakage-resilient model, where a certain amount of arbitrary information about users’ files are leaked. Particularly, we address another important security issue in client-side deduplication— confidentiality of users’ sensitive files against the honest-but-curious cloud storage server, by proposing a method to distribute a randomly chosen per-file encryption key ∗ This work is supported by Fund SecDC-112172014. [Copyright notice will appear here once ’preprint’ option is removed.] to all owners of the same file, in an efficient and secure way. This key distribution method will be seamlessly incorporated into the process of client-side deduplication. We emphasize that “convergent encryption”, which encrypts a file F using hash value hash(F ) as encryption key, is not leakage-resilient and is thus insecure in the setting of PoW. Therefore, the direct combination of a PoW scheme and convergent encryption is not a solution for client-side deduplication over encrypted data. General Terms Algorithm, Security

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data

Data deduplication, aiming to eliminate duplicate data, has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. Unfortunately, as an increasing number of sensitive data are stored remotely, the encryption, the simplest way for data privacy, is not compatible with data deduplication. Though many research efforts have been devoted to securing deduplication,...

متن کامل

Differentially private client-side data deduplication protocol for cloud storage services

Cloud storage service providers apply data client-side deduplication across multiple users to achieve cost savings of network bandwidth and disk storage. However, deduplication can be used as a side channel by attackers who try to obtain sensitive information of other users’ data. We propose a differentially private client-side deduplication protocol. A storage gateway allows efficient data ded...

متن کامل

Secure Deduplication of Encrypted Data without Additional Servers

Encrypting data on the client-side before uploading it to cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard practice of deduplication in cloud storage services. Reconciling client-side encryption with cross-user deduplication has been an active research topic. In this paper, we present the first secure cross-user deduplication ...

متن کامل

Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing

Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...

متن کامل

Efficient and Secure File Deduplication in Cloud Storage

Outsourcing to a cloud storage brings forth new challenges for the efficient utilization of computing resources as well as simultaneously maintaining privacy and security for the outsourced data. Data deduplication refers to a technique that eliminates redundant data on the storage and the network, and is considered to be one of the most-promising technologies that offers efficient resource uti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011