Skip to main content

Policy-Based De-duplication in Secure Cloud Storage

  • Conference paper
Book cover Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

Abstract

Reducing the amount of data need to be transferred, stored, and managed becomes a crucial for cloud storage. On the other hand, as user data are stored and processed by outsourced cloud provider, encryption becomes a necessary before updating data into the cloud. However, the above two goals are greatly opposed to each other. In order to solve the above conflict, a policy-based de-duplication proxy scheme is proposed in this paper. It suggests a policy-based de-duplication proxy scheme to enable different trust relations among cloud storage components, de-duplication related components and different security requirements. Further proposes a key management mechanism to access and decrypt the shared de-duplicated data chunks based on Proxy Re-encryption algorithms. This paper finally analyses the security of the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zheng, Q., Xu, S.: Secure and efficient proof of storage with deduplication. In: Proc. CODASPY 2012, pp. 1–12 (2012)

    Google Scholar 

  2. Marques, L., Costa, C.J.: Secure deduplication on mobile devices. In: Proc. OSDOC 2011, pp. 16–29 (2011)

    Google Scholar 

  3. Storer, M.W., Greenan, K., Long, D.D., Miller, E.L.: Secure data deduplication. In: Proc. StorageSS 2008, pp. 1–10 (2008)

    Google Scholar 

  4. Xu, J., Chang, E., Zhou, J.: Secure Cloud Storage with Encrypted Data using File-Based Authentication. In: IACR (2011), http://eprint.iacr.org/2011/538.pdf

  5. Rahumed, A., Chen, H.C.H., Tang, Y., Lee, P.P.C., Lui, J.C.S.: A secure cloud backup system with assured deletion and version control. In: Proc. ICPPW 2011, pp. 160–167 (2011)

    Google Scholar 

  6. Anderson, P., Zhang, L.: Fast and Secure Laptop Backups with Encrypted De-duplication. In: Proc. LISA 2010, pp. 29–40 (2010)

    Google Scholar 

  7. Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proc. ICDCS 2002, pp. 617–624 (2002)

    Google Scholar 

  8. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Security & Privacy 8(6), 40–47 (2010)

    Article  Google Scholar 

  9. Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Annual ACM Symposium on Theory of Computing (1982)

    Google Scholar 

  10. Gantz, J.F., et al.: The Expanding Digital Universe: A Forecast of Worldwide Information Growth through 2010. In: IDC (March 2007)

    Google Scholar 

  11. Nath, P., Urgaonkar, B., Sivasubramaniam, A.: Evaluating the usefulness of content addressable storage for high-performance data intensive applications. In: Proceedings of the 17th International Symposium on High Performance Distributed Computing, Boston, MA, USA (2008)

    Google Scholar 

  12. Green, M., Hohenberger, S., Ateniese, G., Fu, K.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium, NDSS (February 2005)

    Google Scholar 

  13. Green, M., Ateniese, G.: Identity-Based Proxy Re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Blaze, M., Bleumer, G., Strauss, M.J.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  15. Zhu, B., Li, K., Patterson, H.: Avoiding the Disk Bottleneck in the Data Domain Deduplication File System. In: Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST 2008), pp. 269–282 (February 2008)

    Google Scholar 

  16. Liu, C., Lu, Y., Du, D., Wang, D.: ADMAD: Application-Driven Metadata Aware De-duplication Archival Storage System. In: International Workshop on Storage Network Architecture and Parallel I/Os (SNAPI 2008) Held In Conjunction with the 25th IEEE Conference on Mass Storage Systems and Technologies, MSST 2008 (2008)

    Google Scholar 

  17. Liu, C., et al.: R-ADMAD: High reliability provision for large-scale de-duplication archival storage systems. In: Proceedings of the 23rd International Conference on Supercomputing, pp. 370–379 (June 2009)

    Google Scholar 

  18. Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Type-Based Proxy Re-encryption and Its Construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 130–144. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Transactions on Networking 8(3), 281–293 (2000)

    Article  Google Scholar 

  20. Weaver, A.C.: Secure sockets layer. Computer 39(4), 88–90 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, C., Liu, X., Wan, L. (2013). Policy-Based De-duplication in Secure Cloud Storage. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics