Multimedia Tools and Applications

, Volume 76, Issue 19, pp 19363–19378 | Cite as

Secure proof of storage with deduplication for cloud storage systems

  • Youngjoo Shin
  • Dongyoung Koo
  • Junbeom Hur
  • Joobeom Yun


Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.


Cloud computing Multimedia content security Cloud storage Proof of data possession Proof of retrievability Proof of ownership Data deduplication 



This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2013R1A2A2A01005559, No.2015R1C1A1A02036511)


  1. 1.
    Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proc ACM Conf Comput Commun Sec (CCS’07), pp 598–610Google Scholar
  2. 2.
    Ateniese G, Pietro R.D, Mancini LV Tsudik G (2008) Scalable and efficient provable data possession. In: Proc 4th Int Conf Sec Privacy Commun Networks, SecureComm’08, pp 9:1–9:10Google Scholar
  3. 3.
    Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: Proc 2014 I.E. Conf Commun Network Sec (CNS’14), pp 481–489Google Scholar
  4. 4.
    Boneh D, Franlkin MK (2001) Identity-based encryption from the weil pairing. In: Adv Cryptol – CRYPTO’01, LNCS 2139, pp 213–229Google Scholar
  5. 5.
    Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: Theory and implementation. In: Proc ACM Workshop Cloud Comput Sec (CCSW’09), pp 43–54Google Scholar
  6. 6.
    Cisco Visual Networking Index “Global mobile data traffic forecast update,” 2012–2017Google Scholar
  7. 7.
    Cui H, Mu Y, Au MH (2014) Proof of retrievability with public verifiability resilient against related-key attacks. IET Inf Secur 9:43–49CrossRefGoogle Scholar
  8. 8.
    Dodis Y, Vadhan S, Wichs D (2009) Proofs of retrievability via hardness amplification. In: Proc Conf Theor Cryptograp (TCC’09), LNCS 5444, pp 109–127Google Scholar
  9. 9.
    Erway C, Kupcu A, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. ACM Trans Inf Syst Secur 17(4):15:1–15:29CrossRefGoogle Scholar
  10. 10.
    Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proc ACM Conf Comput Commun Sec (CCS’11), pp 491–500Google Scholar
  11. 11.
    Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Sec Privacy Mag 8:40–47CrossRefGoogle Scholar
  12. 12.
    Jia X, Ee-Chien C, Jianying Z (2011) Leakage-resilient client-side deduplication of encrypted data in cloud storage. In: IACR Cryptol ePrint Arch, Rep 2011/538Google Scholar
  13. 13.
    Joux A (2002) The weil and tate pairings as building blocks for public key cryptosystems. In: Proc Int Sympo Algorith Num Theor (ANTS’05), pp 20–32Google Scholar
  14. 14.
    Li J, Chen X, Huang X, Tang S, Xiang Y (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput. doi:  10.1109/TC.2015.2401017
  15. 15.
    Li J, Chen X, Li M, Li J, Lee PC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25:1615–1625CrossRefGoogle Scholar
  16. 16.
    Li J, Li Y, Chen X, Lee PC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26:1206–1216CrossRefGoogle Scholar
  17. 17.
    Lorena G, Agustin O (2015) An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50:49–59CrossRefGoogle Scholar
  18. 18.
    Mulazzani M, Schrittwieser S, Leithner M, Huber M, Weippl E (2011) Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proc USENIX Conf Sec (SEC’11)Google Scholar
  19. 19.
    Paulo J, Pereira J (2015) A survey and classification on storage deduplication systems. ACM Comput Surv 47:11:1–11:30Google Scholar
  20. 20.
    Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H. 264/AVC standard. IEEE Trans Circ Syst Video Technol 17(9):1103–1120CrossRefGoogle Scholar
  21. 21.
    Shacham H, Waters B (2008) Compact proofs of retrievability. In: Adv Cryptol - ASIACRYPT’08, LNCS 5350, pp 90–107Google Scholar
  22. 22.
    Shi E, Stefanov E, Papamanthou C (2013) Practical dynamic proofs of retrievability. In: Proc ACM Conf Comput Commun Sec (CCS’13), pp 325–336Google Scholar
  23. 23.
    Shin Y, Hur J, Kim K (2012) Security weakness in the proof of storage with deduplication. IACR Cryptol ePrint Arch, Rep 2012/554Google Scholar
  24. 24.
    Soohak M, Gani A, Talebian H, Akhunzada A (2015) Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput Surv 47:65:1–65:34Google Scholar
  25. 25.
    Wang H (2015) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8:328–340Google Scholar
  26. 26.
    Zheng Q, Xu S (2012) Secure and efficient proof of storage with deduplication. In: Proc Sec ACM Conf Data Applic Sec Privacy (CODASPY’12), pp 1–12Google Scholar
  27. 27.
    Zheng Y, Yuan X, Wang X, Jiang J, Wang C, Gui X (2015) Enabling encrypted cloud media center with secure deduplication. In: Proc 10th ACM Sympo Inform, Comput Commun Sec (ASIACCS’15), pp 63-72Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.The Affiliated Institute of ETRIYuseong-guSouth Korea
  2. 2.Department of Computer ScienceKorea Advanced Institute of Science and Technology (KAIST)Daedeok InnopolisSouth Korea
  3. 3.Department of Computer Science and EngineeringKorea UniversitySeoulSouth Korea
  4. 4.Department of Computer and Information SecuritySejong UniversitySeoulSouth Korea

Personalised recommendations