Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3565291.3565310acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdtConference Proceedingsconference-collections
research-article

A Secure Encrypted Data Deduplication Scheme Based on Data Popularity Supporting Dynamic Ownership Management

Published: 16 December 2022 Publication History

Abstract

Data deduplication technology can save a lot of storage space for the cloud server. However, how to use data deduplication technology to save storage space while ensuring data security has always been a difficult problem. To find a balance between data deduplication technology and data security, some studies introduce the concept of data popularity. In the encrypted data deduplication scheme based on data popularity, the popular data is encrypted by simple and efficient convergent encryption, and the unpopular data is encrypted by semantically secure symmetric encryption. However, the existing schemes do not consider the problem of dynamic ownership management. If the revoked user obtains the ciphertext of popular data, he/she also can decrypt the ciphertext to obtain the plaintext data. In this paper, we propose a secure encrypted data deduplication scheme supporting dynamic ownership management, which can prevent the revoked user from obtaining plaintext data. We use proxy re-encryption algorithm to encrypt convergent ciphertext which is able to prevent ciphertext data from leaking information of popular data. Besides, we design a proof of ownership protocol to prevent the revoked user from regaining access to the data. In this way, the revoked user will not be able to obtain plaintext data.

References

[1]
D. Reinsel, J. Gantz, and J. Rydning. The digitization of the world from edge to core. Framingham, MA: International Data Corporation, 2018.
[2]
J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings 22nd International Conference on Distributed Computing Systems, pages 617-624, 2002.
[3]
J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In 18th International Conference on Financial Cryptography and Data Security, pages 99–118, 2014.
[4]
M. Bellare, S. Keelveedhi, and T. Ristenpart. MessageLocked encryption and secure deduplication. In 32nd Annual IACR Eurocrypt International Conference on the Theory and Applications of Cryptographic Techniques, pages 296–312, 2013.
[5]
P. Puzio, R. Molva, M. Onen, and S. Loureiro. ClouDedup: Secure deduplication with encrypted data for cloud storage. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pages 363–370, 2013.
[6]
X. Liu, W. Sun, W. Lou, Q. Pei, and Y. Zhang. One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. In IEEE INFOCOM 2017 IEEE Conference on Computer Communications, pages 1–9, 2017.
[7]
R. Chen, Y. Mu, G. Yang, and F. Guo. BL-MLE: block-level message-locked encryption for secure large file deduplication. IEEE Trans. Inf. Forensic Secur, 10(12):2643–2652, 2015.
[8]
P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proceedings of the 24th International Conference on Large Installation System Administration, pages 1–8, 2010.
[9]
M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev. Message-locked encryption for lock-dependent messages. In Annual Cryptology Conference, pages 374–391, 2013.
[10]
M. Miao, J. Wang, H. Li, and X. Chen. Secure multi-server-aided data deduplication in cloud computing. Pervasive and Mobile Computing, 24:129–137, 2015.
[11]
M. Bellare, S. Keelveedhi, and T. Ristenpart. DupLESS: Server-aided encryption for deduplicated storage. Usenix Conference on Security, 2013.
[12]
Y. Zhang, C. Xu, H. Li, K. Yang, J. Zhou, and X. Lin. Healthdep: An efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Transactions on Industrial Informatics, 14(9):4101–4112, 2018.
[13]
D. L. Vo, F. Zhang, and K. Kim. A new threshold blind signature scheme from pairings. In The 2003 Symposium on Cryptography and Information Security, pages 699–702, 2003.
[14]
J. Liu, N. Asokan, and B. Pinkas. Secure deduplication of encrypted data without additional independent servers. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 874–885, 2015.
[15]
C. Yu. POSTER: Efficient cross-user chunk-level client-side data deduplication with symmetrically encrypted two-party interactions. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 1763–1765, 2016.
[16]
P. Puzio, R. Molva, M. Onen, and S. Loureiro. PerfectDedup: Secure data deduplication. In 10th Data Privacy Management International Workshop / 4th International Workshop in Quantitative Aspects in Security Assurance, pages 150–166, 2016.
[17]
J. Stanek and L. Kencl. Enhanced secure thresholded data deduplication scheme for cloud storage. IEEE Transactions on Dependable and Secure Computing, 15(4):694–707, 2018.
[18]
G. Ha, H. Chen, C. Jia, R. Li, and Q. Jia. A secure deduplication scheme based on data popularity with fully random tags. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, 2021.
[19]
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In ACM Conference on Computer & Communications Security, pages 491-500, 2011.
[20]
J. Xu, E. C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pages 195-206, 2013.
[21]
J. Hur, D. Koo, Y. Shin and K. Kang. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage. IEEE Transactions on Knowledge and Data Engineering, pages 69-70, 2018.
[22]
J. Li, C. Qin, PPC. Lee and L. Jin. Rekeying for Encrypted Deduplication Storage. IEEE/IFIP International Conference on Dependable Systems & Networks, 2016.
[23]
H. Yuan, X. Chen, J. Li, T. Jiang, J. Wang and R. Deng. Secure Cloud Data Deduplication with Efficient Re-Encryption. IEEE Transactions on Services Computing, 15(1): 442-456, 2022.
[24]
Y. Wang, M. Miao, J. Wang and X. Zhang. Secure deduplication with efficient user revocation in cloud storage. Computer Standards & Interfaces, 2021.
[25]
G. Kan, C. Jin, H. Zhu, Y. Xu and N. Liu. An identity-based proxy re-encryption for data deduplication in cloud. Journal of Systems Architecture, 2021.
[26]
S. Jiang, T. Jiang and L. Wang. Secure and Efficient Cloud Data Deduplication with Ownership Management. IEEE Transactions on Services Computing, 13(6): 1152-1165, 2020.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICBDT '22: Proceedings of the 5th International Conference on Big Data Technologies
September 2022
454 pages
ISBN:9781450396875
DOI:10.1145/3565291
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 December 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud storage
  2. Data popularity
  3. Data privacy
  4. Encrypted data deduplication
  5. Proof of ownership
  6. User revocation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICBDT 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 60
    Total Downloads
  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media