Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9530))

Abstract

Cloud computing offers a new way of service provision by re-arranging various resources and IT structures over the Internet. Private user data are often stored in cloud in an encrypted form in order to preserve the privacy of data owners. Encrypted data sharing introduces new challenges for cloud data deduplication. We found that existing solutions of deduplication suffer from high computation complexity and cost and therefore few of them can be really deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on proxy re-encryption. We evaluate its performance and advantages based on extensive analysis and implementation. The results show the efficiency and effectiveness of the scheme for potential practical deployment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bellare, M., Keelveedhi, S., Ristenpart, T.: Dupless: Server-aided encryption for deduplicated storage. In: 22nd USENIX Conference on Security, pp. 179–194. USENIX (2013)

    Google Scholar 

  2. A file-storage and sharing service. http://www.dropbox.com/

  3. Google Drive. http://drive.google.com

  4. Mozy: A file-storage and sharing service.http://mozy.com/

  5. Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE (2002)

    Google Scholar 

  6. Wallace, G., Douglis, F., Qian, H., Shilane, P., Smaldone, S., Chamness, M., Hsu, W.: Characteristics of backup workloads in production systems. In: FAST, p. 4. USENIX (2012)

    Google Scholar 

  7. Wilcox Z.O.: Convergent encryption reconsidered (2011). http://www.mailarchive.com/cryptography@metzdowd.com/msg08949.html

  8. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)

    Article  MATH  Google Scholar 

  9. Opendedup. http://opendedup.org/

  10. Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7, 1–20 (2012)

    Article  Google Scholar 

  11. Pettitt, J.: Hash of plaintext as key? http://cypherpunks.venona.com/date/1996/02/msg02013.html

  12. The Freenet Project. Freenet. https://freenetproject.org/

  13. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  14. Perttula: Attacks on convergent encryption. http://bit.ly/yQxyvl

  15. Liu, C., Liu, X., Wan, L.: Policy-based de-duplication in secure cloud storage. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 250–262. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Puzio, P., Molva, R., Onen, M., Loureiro, S.: ClouDedup: Secure deduplication with encrypted data for cloud storage. In: 5th International Conference on Cloud Computing Technology and Science, pp. 363–370. IEEE (2013)

    Google Scholar 

  17. Sun, Z., Shen, J., Yong, J.M.: DeDu: Building a deduplication storage system over cloud computing. In: 15th International Conference on Computer Supported Cooperative Work in Design, pp. 348–355. IEEE (2011)

    Google Scholar 

  18. Wen, Z.C., Luo, J.M., Chen, H.J., Meng, J.X., Li X., Li J.: A verifiable data deduplication scheme in cloud computing. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 85–90. IEEE (2014)

    Google Scholar 

  19. Li, J., Li, Y.K., Chen, X.F., Lee, P.P.C., Lou, W.J.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26, 1206–1216 (2015)

    Article  Google Scholar 

  20. Meye, P., Raipin, P., Tronel, F., Anceaume, E.: A secure two-phase data deduplication scheme. In: HPCC/CSS/ICESS 2014, pp. 802–809. IEEE (2014)

    Google Scholar 

  21. Paulo, J., Pereira, J.: A survey and classification of storage deduplication systems. ACM Comput. Surv. 47, 1–30 (2014)

    Article  Google Scholar 

  22. Li, Y.-K., Xu, M., Ng, C.-H., Lee, P.P.C.: Efficient hybrid inline and out-of-line deduplication for backup storage. ACM Trans. Storage 11, 2:1–2:21 (2014)

    Article  Google Scholar 

  23. Fu, M., Feng, D., Hua, Y., He, X., Chen, Z.N., Xia, W., Huang, F., Liu, Q.: Accelerating restore and garbage collection in deduplication-based backup systems via exploiting historical information. In: 2014 USENIX Annual Technical Conference, pp. 181–192. USENIX Association (2014)

    Google Scholar 

  24. Kaczmarczyk, M., Barczynski, M., Kilian, W., Dubnicki, C.: Reducing impact of data fragmentation caused by in-line deduplication. In: 5th Annual International Systems and Storage Conference, pp. 15:1–15:12. ACM (2012)

    Google Scholar 

  25. Lillibridge, M., Eshghi, K., Bhagwat, D.: Improving restore speed for backup systems that use inline chunk-based deduplication. In: FAST, pp. 183–198. USENIX (2013)

    Google Scholar 

Download references

Acknowledgement

This work is sponsored by the PhD grant (JY0300130104) of Chinese Educational Ministry, the “111 project” (B08038), the initial grant of Chinese Educational Ministry for researchers from abroad (JY0600132901), and the grant of Shaanxi Province for excellent researchers from abroad (680F1303), as well as Aalto University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yan, Z., Ding, W., Zhu, H. (2015). A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27137-8_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27136-1

  • Online ISBN: 978-3-319-27137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics