Provable ownership of files in deduplication cloud storage
نویسندگان
چکیده
With the rapid adoption of cloud storage services, a great deal of data is being stored at remote servers, so a new technology, client-side deduplication, which stores only a single copy of repeating data, is proposed to identify the client’s deduplication and save the bandwidth of uploading copies of existing files to the server. It was recently found, however, that this promising technology is vulnerable to a new kind of attack in which by learning just a small piece of information about the file, namely its hash value, an attacker is able to obtain the entire file from the server. In this paper, to solve this problem, we propose a cryptographically secure and efficient scheme for a client to prove to the server his ownership on the basis of actual possession of the entire original file instead of only partial information about it. Our scheme utilizes the technique of spot checking in which the client only needs to access small portions of the original file, dynamic coefficients and randomly chosen indices of the original files. Our extensive security analysis shows that the proposed scheme can generate provable ownership of the file and maintain high detection probability of client misbehavior. Both performance analysis and simulation results demonstrate that our proposed scheme is much more efficient than the existing schemes, especially in reducing the burden of the client. Copyright © 2013 John Wiley & Sons, Ltd.
منابع مشابه
Provable Ownership of Encrypted Files in De-duplication Cloud Storage
The rapid adoption of cloud storage services has created an issue that many duplicated copies of files are stored in the remote storage servers, which not only wastes the communication bandwidth for duplicated file uploading, but also increases the cost of security data management. To solve this problem, client-side deduplication was introduced to avoid the client from uploading files already e...
متن کاملLeakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
Cloud storage service is gaining popularity in recent years. Clientside deduplication is an effective approach to save bandwidth and storage, and adopted by many cloud storage services including Dropbox, MozyHome and Wuala. Security flaws, which may lead to private data leakage, in the existing client-side deduplication mechanism are found recently by Harnik et al. (S&P Magazine, ’10) and Halev...
متن کاملA Dynamic Proxy Oriented Approach for Remote Data Integrity checking along with Secure Deduplication in Cloud
In Cloud computing users store data over remote servers instead of computer’s hard drive. This leads to several security problems since data is out of the control of the user. So, to protect against the security attacks and to preserve the data integrity in the cloud, Huaqun Wang et.al proposed proxy oriented remote data integrity checking (RDIC). However, this scheme only focuses on one-way va...
متن کاملA Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing
The popularity and widespread use of Cloud have brought great convenience for data sharing and data storage. The data sharing with a large number of participants take into account issuers like data integrity, efficiency and privacy of the owner for data. In cloud storage services one critical challenge is to manage ever-increasing volume of data storage in cloud. To make data management more sc...
متن کاملData Deduplication Scheme for Cloud Storage
Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we introduce two categories of data deduplication strategy, and extend the fault-tolerant digital signature scheme proposed by Zhang on examining redundancy of blocks to achieve the data deduplication. The proposed scheme in this paper not only reduces the cloud storage capacity, but also i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Security and Communication Networks
دوره 8 شماره
صفحات -
تاریخ انتشار 2015