Skip to main content
Log in

Secure proof of storage with deduplication for cloud storage systems

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proc ACM Conf Comput Commun Sec (CCS’07), pp 598–610

  2. Ateniese G, Pietro R.D, Mancini LV Tsudik G (2008) Scalable and efficient provable data possession. In: Proc 4th Int Conf Sec Privacy Commun Networks, SecureComm’08, pp 9:1–9:10

  3. Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: Proc 2014 I.E. Conf Commun Network Sec (CNS’14), pp 481–489

  4. Boneh D, Franlkin MK (2001) Identity-based encryption from the weil pairing. In: Adv Cryptol – CRYPTO’01, LNCS 2139, pp 213–229

  5. Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: Theory and implementation. In: Proc ACM Workshop Cloud Comput Sec (CCSW’09), pp 43–54

  6. Cisco Visual Networking Index “Global mobile data traffic forecast update,” 2012–2017

  7. Cui H, Mu Y, Au MH (2014) Proof of retrievability with public verifiability resilient against related-key attacks. IET Inf Secur 9:43–49

    Article  Google Scholar 

  8. Dodis Y, Vadhan S, Wichs D (2009) Proofs of retrievability via hardness amplification. In: Proc Conf Theor Cryptograp (TCC’09), LNCS 5444, pp 109–127

  9. Erway C, Kupcu A, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. ACM Trans Inf Syst Secur 17(4):15:1–15:29

    Article  Google Scholar 

  10. Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proc ACM Conf Comput Commun Sec (CCS’11), pp 491–500

  11. Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Sec Privacy Mag 8:40–47

    Article  Google Scholar 

  12. Jia X, Ee-Chien C, Jianying Z (2011) Leakage-resilient client-side deduplication of encrypted data in cloud storage. In: IACR Cryptol ePrint Arch, Rep 2011/538

  13. Joux A (2002) The weil and tate pairings as building blocks for public key cryptosystems. In: Proc Int Sympo Algorith Num Theor (ANTS’05), pp 20–32

  14. Li J, Chen X, Huang X, Tang S, Xiang Y (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput. doi: 10.1109/TC.2015.2401017

  15. Li J, Chen X, Li M, Li J, Lee PC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25:1615–1625

    Article  Google Scholar 

  16. Li J, Li Y, Chen X, Lee PC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26:1206–1216

    Article  Google Scholar 

  17. Lorena G, Agustin O (2015) An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50:49–59

    Article  Google Scholar 

  18. Mulazzani M, Schrittwieser S, Leithner M, Huber M, Weippl E (2011) Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proc USENIX Conf Sec (SEC’11)

  19. Paulo J, Pereira J (2015) A survey and classification on storage deduplication systems. ACM Comput Surv 47:11:1–11:30

    Google Scholar 

  20. Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H. 264/AVC standard. IEEE Trans Circ Syst Video Technol 17(9):1103–1120

    Article  Google Scholar 

  21. Shacham H, Waters B (2008) Compact proofs of retrievability. In: Adv Cryptol - ASIACRYPT’08, LNCS 5350, pp 90–107

  22. Shi E, Stefanov E, Papamanthou C (2013) Practical dynamic proofs of retrievability. In: Proc ACM Conf Comput Commun Sec (CCS’13), pp 325–336

  23. Shin Y, Hur J, Kim K (2012) Security weakness in the proof of storage with deduplication. IACR Cryptol ePrint Arch, Rep 2012/554

  24. Soohak M, Gani A, Talebian H, Akhunzada A (2015) Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput Surv 47:65:1–65:34

    Google Scholar 

  25. Wang H (2015) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8:328–340

  26. Zheng Q, Xu S (2012) Secure and efficient proof of storage with deduplication. In: Proc Sec ACM Conf Data Applic Sec Privacy (CODASPY’12), pp 1–12

  27. Zheng Y, Yuan X, Wang X, Jiang J, Wang C, Gui X (2015) Enabling encrypted cloud media center with secure deduplication. In: Proc 10th ACM Sympo Inform, Comput Commun Sec (ASIACCS’15), pp 63-72

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2013R1A2A2A01005559, No.2015R1C1A1A02036511)

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Junbeom Hur or Joobeom Yun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shin, Y., Koo, D., Hur, J. et al. Secure proof of storage with deduplication for cloud storage systems. Multimed Tools Appl 76, 19363–19378 (2017). https://doi.org/10.1007/s11042-015-2956-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2956-z

Keywords

Navigation