Provable Ownership of Encrypted Files in De-duplication Cloud Storage
نویسندگان
چکیده
The rapid adoption of cloud storage services has created an issue that many duplicated copies of files are stored in the remote storage servers, which not only wastes the communication bandwidth for duplicated file uploading, but also increases the cost of security data management. To solve this problem, client-side deduplication was introduced to avoid the client from uploading files already existed in the remote servers. However, the existing scheme was recently found to be vulnerable to security attacks in that by learning a small piece of information related to the file, such as the hash value of the file, the attacker may be able to get full access of the entire file; and the confidentiality of the date may be vulnerable to “honest-but-curious” attacks. In this paper, to solve the problems mentioned above, we propose a cryptographically secure and efficient scheme to support cross-user client side deduplication over encrypted file. Our scheme utilizes the technique of spot checking in which the client only need to access small portions of the original file, dynamic coefficients, randomly chosen indices of the original files and a subtle approach to distribute the file encrypting key among clients to satisfy security requirements. Our extensive security analysis shows that the proposed scheme can generate provable ownership of the encrypted file (POEF) with the presence of the curious server, and maintain a high detection probability of the client misbehavior. Both performance analysis and simulation results demonstrate that our proposed scheme is much more efficient than the existing schemes, especially in reducing the burden of the client.
منابع مشابه
An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password
Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comp...
متن کاملA Survey on Detection Deduplication Encrypted Files in Cloud
ARTICLE INFO Today is the most important issue in cloud computing is duplication for any organization, so we analysis this issue an avoid the reparative files on cloud storage. Avoidance of the file is advantages the cloud size issue. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before ...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملProvable ownership of files in deduplication cloud storage
With the rapid adoption of cloud storage services, a great deal of data is being stored at remote servers, so a new technology, client-side deduplication, which stores only a single copy of repeating data, is proposed to identify the client’s deduplication and save the bandwidth of uploading copies of existing files to the server. It was recently found, however, that this promising technology i...
متن کاملBlock Level De-duplication Check for Shared Data on Hybrid Cloud using Convergent Key
In regards to increase in use of digital information users prefer to store information in cloud system. In cloud storage system many users can store same type of data leading to data duplication causing a high utilization of bandwidth. Some techniques are proposed for making cloud more efficient and effective regarding to storage and bandwidth. In current time data de-duplication is effective t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ad Hoc & Sensor Wireless Networks
دوره 26 شماره
صفحات -
تاریخ انتشار 2015