Abstract
Cloud computing offers a new way of service provision by re-arranging various resources and IT structures over the Internet. Private user data are often stored in cloud in an encrypted form in order to preserve the privacy of data owners. Encrypted data sharing introduces new challenges for cloud data deduplication. We found that existing solutions of deduplication suffer from high computation complexity and cost and therefore few of them can be really deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on proxy re-encryption. We evaluate its performance and advantages based on extensive analysis and implementation. The results show the efficiency and effectiveness of the scheme for potential practical deployment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bellare, M., Keelveedhi, S., Ristenpart, T.: Dupless: Server-aided encryption for deduplicated storage. In: 22nd USENIX Conference on Security, pp. 179–194. USENIX (2013)
A file-storage and sharing service. http://www.dropbox.com/
Google Drive. http://drive.google.com
Mozy: A file-storage and sharing service.http://mozy.com/
Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE (2002)
Wallace, G., Douglis, F., Qian, H., Shilane, P., Smaldone, S., Chamness, M., Hsu, W.: Characteristics of backup workloads in production systems. In: FAST, p. 4. USENIX (2012)
Wilcox Z.O.: Convergent encryption reconsidered (2011). http://www.mailarchive.com/cryptography@metzdowd.com/msg08949.html
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)
Opendedup. http://opendedup.org/
Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7, 1–20 (2012)
Pettitt, J.: Hash of plaintext as key? http://cypherpunks.venona.com/date/1996/02/msg02013.html
The Freenet Project. Freenet. https://freenetproject.org/
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013)
Perttula: Attacks on convergent encryption. http://bit.ly/yQxyvl
Liu, C., Liu, X., Wan, L.: Policy-based de-duplication in secure cloud storage. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 250–262. Springer, Heidelberg (2013)
Puzio, P., Molva, R., Onen, M., Loureiro, S.: ClouDedup: Secure deduplication with encrypted data for cloud storage. In: 5th International Conference on Cloud Computing Technology and Science, pp. 363–370. IEEE (2013)
Sun, Z., Shen, J., Yong, J.M.: DeDu: Building a deduplication storage system over cloud computing. In: 15th International Conference on Computer Supported Cooperative Work in Design, pp. 348–355. IEEE (2011)
Wen, Z.C., Luo, J.M., Chen, H.J., Meng, J.X., Li X., Li J.: A verifiable data deduplication scheme in cloud computing. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 85–90. IEEE (2014)
Li, J., Li, Y.K., Chen, X.F., Lee, P.P.C., Lou, W.J.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26, 1206–1216 (2015)
Meye, P., Raipin, P., Tronel, F., Anceaume, E.: A secure two-phase data deduplication scheme. In: HPCC/CSS/ICESS 2014, pp. 802–809. IEEE (2014)
Paulo, J., Pereira, J.: A survey and classification of storage deduplication systems. ACM Comput. Surv. 47, 1–30 (2014)
Li, Y.-K., Xu, M., Ng, C.-H., Lee, P.P.C.: Efficient hybrid inline and out-of-line deduplication for backup storage. ACM Trans. Storage 11, 2:1–2:21 (2014)
Fu, M., Feng, D., Hua, Y., He, X., Chen, Z.N., Xia, W., Huang, F., Liu, Q.: Accelerating restore and garbage collection in deduplication-based backup systems via exploiting historical information. In: 2014 USENIX Annual Technical Conference, pp. 181–192. USENIX Association (2014)
Kaczmarczyk, M., Barczynski, M., Kilian, W., Dubnicki, C.: Reducing impact of data fragmentation caused by in-line deduplication. In: 5th Annual International Systems and Storage Conference, pp. 15:1–15:12. ACM (2012)
Lillibridge, M., Eshghi, K., Bhagwat, D.: Improving restore speed for backup systems that use inline chunk-based deduplication. In: FAST, pp. 183–198. USENIX (2013)
Acknowledgement
This work is sponsored by the PhD grant (JY0300130104) of Chinese Educational Ministry, the “111 project” (B08038), the initial grant of Chinese Educational Ministry for researchers from abroad (JY0600132901), and the grant of Shaanxi Province for excellent researchers from abroad (680F1303), as well as Aalto University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yan, Z., Ding, W., Zhu, H. (2015). A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-27137-8_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27136-1
Online ISBN: 978-3-319-27137-8
eBook Packages: Computer ScienceComputer Science (R0)