Abstract
Data deduplication technology makes the same data only keep one physical copy in the cloud, which can effectively eliminate data redundancy and achieve efficient storage. Data deduplication, especially encrypted data duplication, has become a research hotspot. Convergent encryption can effectively solve the existing problem of encrypted data deduplication. However, the cloud server cannot access plaintext data in the ciphertext environment, and it cannot check the consistency of the ciphertext and file label. Therefore, when the duplicate faking attack occurs, how to effectively trace malicious users becomes a critical problem. In this paper, we firstly introduce the blockchain technology into the scenario of secure data deduplication, and construct a specific deduplication scheme to solve the problem of malicious user tracing. We make use of the traceability of the blockchain to form a tamper-proof data chain. When the duplicate faking attack occurs, we can trace the identity of the malicious user and find out all the data files stored in the cloud server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abadi, M., Boneh, D., Mironov, I., Raghunathan, A., Segev, G.: Message-locked encryption for lock-dependent messages. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 374–391. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40041-4_21
American Bankers Association and others. Public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA), pp. 62–1998. ANSI X9 (1999)
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_18
Ghoshal, S., Paul, G.: Exploiting block-chain data structure for auditorless auditing on cloud data. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 359–371. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49806-5_19
González-Manzano, L., Orfila, A.: An efficient confidentiality-preserving proof of ownership for deduplication. J. Netw. Comput. Appl. 50, 49–59 (2015)
Huang, H., Chen, X., Wang, J.: Blockchain-based multiple groups data sharing with anonymity and traceability. Sci. China Inf. Sci. 63(3), 1–13 (2019). https://doi.org/10.1007/s11432-018-9781-0
Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Fut. Gener. Comput. Syst. 78, 850–858 (2018)
Wang, J., Chen, X., Li, J., Kluczniak, K., Kutylowski, M.: A new secure data deduplication approach supporting user traceability. In: 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 120–124. IEEE (2015)
Wang, J., Chen, X., Li, J., Kluczniak, K., Kutyłowski, M.: TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3), 270–289 (2017)
Acknowledgments
This work is supported in part by the Natural Science Foundation of Fujian Province of China under Grant (No. 2019J01750, No. 2019J01752); the Research Project of Fujian Provincial Education Department of China under Grant (No. JAT170345, No. JAT170346, and No. JK2017031); the Project of Key Laboratory of Financial Mathematics of Fujian Province University (Putian University) under Grant (No. JR201806); and the presidential research fund of Minnan Normal University (No. KJ18024).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Huang, H., Chen, Q., Zhou, Y., Huang, Z. (2020). Blockchain-Based Secure Cloud Data Deduplication with Traceability. In: Zheng, Z., Dai, HN., Fu, X., Chen, B. (eds) Blockchain and Trustworthy Systems. BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_23
Download citation
DOI: https://doi.org/10.1007/978-981-15-9213-3_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9212-6
Online ISBN: 978-981-15-9213-3
eBook Packages: Computer ScienceComputer Science (R0)