Advertisement

Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment

  • Won-Bin Kim
  • Im-Yeong LeeEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 518)

Abstract

Data de-duplication technology is a technology that helps save storage space by preventing the same data from being repeatedly stored in data storage. There are various methods of data de-duplication, but in general, the file source is divided into data blocks of a predetermined size, and the data de-duplication efficiency is improved by comparing each block. Therefore, each data block has a separate ownership, and each ownership is made smaller than the original of the data block. In this case, an attacker who intends to acquire a block of data can guess the data that can be input into each data block, and thus can make a dictionary attack to acquire data ownership. This happens because each data has a separate ownership, and each ownership does not affect the acquisition of other blocks. Therefore, this study proposes a method to solve this problem.

Keywords

Cloud storage Data deduplication Convergent encryption 

Notes

Acknowledgements

This work was supported by Barun ICT Research Center at Yonsei University and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1B03935917)

References

  1. 1.
    Kim KW, Joo YH, Eom YI (2012) Technical trends for cloud storage data deduplication. In: Proceedings of symposium of the Korean Institute of communications and information sciences, pp 228–229Google Scholar
  2. 2.
    Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 296–312CrossRefGoogle Scholar
  3. 3.
    Halevi S, Hamik D, Pinkas B (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security. ACM, pp 491–500Google Scholar
  4. 4.
    Hur JB, Koo DY, Shin YJ, Kang KT (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):3113–3125CrossRefGoogle Scholar
  5. 5.
    Storer MW, Greenan K, Long DD (2008) Secure data deduplication. In: Proceedings of the 4th ACM international workshop on storage security and survivability, ACM, pp 1–10Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringAsanRepublic of Korea

Personalised recommendations