Abstract
A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.
Similar content being viewed by others
References
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing
Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: 2014 federated conference on computer science and information systems (FedCSIS)
Kraemer FA, Braten AE, Tamkittikhun N, Palma D (2017) Fog computing in healthcare—a review and discussion. IEEE Access
Clements AT, Ahmad I, Vilayannur M, Li J et al (2009) Decentralized Deduplication in SAN Cluster File Systems. In: USENIX annual technical conference
Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a Serverless distributed file system. In: 22nd international conference on distributed computing systems, 2002. Proceedings
Bolosky W J, Douceur J R, Ely D, Theimer M (2000) Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. ACM SIGMETRICS Performance Evaluation Review 28(1):34–43
Dropbox. https://www.dropbox.com. Accessed 13 March 2018
Google Drive. https://drive.google.com. Accessed March 13, 2018
Mozy. https://www.mozy.com. Accessed March 13, 2018
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques
Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):3113–3125
Li J, Li Y K, Chen X, Lee PPC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216
Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579
Stanek J, Sorniotti A, Androulaki E, Kencl L (2014) A secure data deduplication scheme for cloud storage. In: International conference on financial cryptography and data security
Keelveedhi S, Bellare M, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. Presented as part of the 22nd USENIX Security Symp
Duan Y (2014) Distributed key generation for encrypted deduplication: achieving the strongest privacy. In: Proceedings of the 6th edition of the ACM workshop on cloud computing security
Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2014), Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615– 1625
Blakley GR, Meadows C (1984) Security of ramp schemes. In: Workshop on the theory and application of cryptographic technique
Bellare M, Namprempre C, Pointcheval D, Semanko M (2003), The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. J Cryptol 16(3):185–215
Li M, Qin C, Lee PPC, Li J (2014) Convergent dispersal: toward storage-efficient security in a Cloud-of-Clouds. HotCloud
Li M, Qin C, Li J, Lee PPC (2016) Cdstore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. IEEE Internet Comput 20(3):45–53
Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011). In: Proceedings of the 18th ACM conference on computer and communications security. Proofs of ownership in remote storage systems
Laurie B, Langley A, Kasper E (2013) Certificate transparency. IETF
Fahl S, Harbach M, Muders T, Smith M (2012) Confidentiality as a service–usable security for the cloud. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (TrustCom)
Fahl S, Harbach M, Muders T, Smith M, Sander U (2012) Helping Johnny 2.0 to Encrypt His Facebook conversations. In: Proceedings of the eighth symposium on usable privacy and security
OpenSSL Project. https://www.openssl.org. Accessed 13 March 2018
The pairing-based cryptography library. https://crypto.stanford.edu/pbc/. Accessed 13 March 2018
Plank JS, Simmerman S, Schuman CD (2008) Jerasure: a library in C/C+ + facilitating erasure coding for storage applications-version 1.2. Citeseer
VMware. https://www.vmware.com. Accessed 13 March 2018
Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. In: ACM computing surveys (CSUR)
Kwon H, Hahn C, Koo D, Hur J (2017) Scalable and reliable key management for secure deduplication in cloud storage. In: 2017 IEEE 10th international conference on cloud computing (CLOUD)
Jiang S, Jiang T, Wang L (2017) Secure and efficient cloud data deduplication with ownership management. IEEE Trans Serv Comput PP(99):1-1
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP’07
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques
Russell A, Wang H (2002) How to fool an unbounded adversary with a short key. In: International conference on the theory and applications of cryptographic techniques
Acknowledgements
This work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2018-0-00269, A research on safe and convenient big data processing methods) (No.2017-0-00184, Self-Learning Cyber Immune Technology Development) (2014-0-00065, Resilient Cyber-Physical Systems Research). This work was also supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2016R1A2A2A05005402).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kwon, H., Hahn, C., Kang, K. et al. Secure deduplication with reliable and revocable key management in fog computing. Peer-to-Peer Netw. Appl. 12, 850–864 (2019). https://doi.org/10.1007/s12083-018-0682-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-018-0682-9