A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud

  • Zheng YanEmail author
  • Wenxiu Ding
  • Haiqi Zhu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9530)


Cloud computing offers a new way of service provision by re-arranging various resources and IT structures over the Internet. Private user data are often stored in cloud in an encrypted form in order to preserve the privacy of data owners. Encrypted data sharing introduces new challenges for cloud data deduplication. We found that existing solutions of deduplication suffer from high computation complexity and cost and therefore few of them can be really deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on proxy re-encryption. We evaluate its performance and advantages based on extensive analysis and implementation. The results show the efficiency and effectiveness of the scheme for potential practical deployment.


Cloud computing Data deduplication Proxy Re-encryption 



This work is sponsored by the PhD grant (JY0300130104) of Chinese Educational Ministry, the “111 project” (B08038), the initial grant of Chinese Educational Ministry for researchers from abroad (JY0600132901), and the grant of Shaanxi Province for excellent researchers from abroad (680F1303), as well as Aalto University.


  1. 1.
    Bellare, M., Keelveedhi, S., Ristenpart, T.: Dupless: Server-aided encryption for deduplicated storage. In: 22nd USENIX Conference on Security, pp. 179–194. USENIX (2013)Google Scholar
  2. 2.
    A file-storage and sharing service.
  3. 3.
  4. 4.
    Mozy: A file-storage and sharing service.
  5. 5.
    Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE (2002)Google Scholar
  6. 6.
    Wallace, G., Douglis, F., Qian, H., Shilane, P., Smaldone, S., Chamness, M., Hsu, W.: Characteristics of backup workloads in production systems. In: FAST, p. 4. USENIX (2012)Google Scholar
  7. 7.
    Wilcox Z.O.: Convergent encryption reconsidered (2011).
  8. 8.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)CrossRefzbMATHGoogle Scholar
  9. 9.
  10. 10.
    Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7, 1–20 (2012)CrossRefGoogle Scholar
  11. 11.
    Pettitt, J.: Hash of plaintext as key?
  12. 12.
    The Freenet Project. Freenet.
  13. 13.
    Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  14. 14.
    Perttula: Attacks on convergent encryption.
  15. 15.
    Liu, C., Liu, X., Wan, L.: Policy-based de-duplication in secure cloud storage. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 250–262. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  16. 16.
    Puzio, P., Molva, R., Onen, M., Loureiro, S.: ClouDedup: Secure deduplication with encrypted data for cloud storage. In: 5th International Conference on Cloud Computing Technology and Science, pp. 363–370. IEEE (2013)Google Scholar
  17. 17.
    Sun, Z., Shen, J., Yong, J.M.: DeDu: Building a deduplication storage system over cloud computing. In: 15th International Conference on Computer Supported Cooperative Work in Design, pp. 348–355. IEEE (2011)Google Scholar
  18. 18.
    Wen, Z.C., Luo, J.M., Chen, H.J., Meng, J.X., Li X., Li J.: A verifiable data deduplication scheme in cloud computing. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 85–90. IEEE (2014)Google Scholar
  19. 19.
    Li, J., Li, Y.K., Chen, X.F., Lee, P.P.C., Lou, W.J.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26, 1206–1216 (2015)CrossRefGoogle Scholar
  20. 20.
    Meye, P., Raipin, P., Tronel, F., Anceaume, E.: A secure two-phase data deduplication scheme. In: HPCC/CSS/ICESS 2014, pp. 802–809. IEEE (2014)Google Scholar
  21. 21.
    Paulo, J., Pereira, J.: A survey and classification of storage deduplication systems. ACM Comput. Surv. 47, 1–30 (2014)CrossRefGoogle Scholar
  22. 22.
    Li, Y.-K., Xu, M., Ng, C.-H., Lee, P.P.C.: Efficient hybrid inline and out-of-line deduplication for backup storage. ACM Trans. Storage 11, 2:1–2:21 (2014)CrossRefGoogle Scholar
  23. 23.
    Fu, M., Feng, D., Hua, Y., He, X., Chen, Z.N., Xia, W., Huang, F., Liu, Q.: Accelerating restore and garbage collection in deduplication-based backup systems via exploiting historical information. In: 2014 USENIX Annual Technical Conference, pp. 181–192. USENIX Association (2014)Google Scholar
  24. 24.
    Kaczmarczyk, M., Barczynski, M., Kilian, W., Dubnicki, C.: Reducing impact of data fragmentation caused by in-line deduplication. In: 5th Annual International Systems and Storage Conference, pp. 15:1–15:12. ACM (2012)Google Scholar
  25. 25.
    Lillibridge, M., Eshghi, K., Bhagwat, D.: Improving restore speed for backup systems that use inline chunk-based deduplication. In: FAST, pp. 183–198. USENIX (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.State Key Lab on Integrated Services NetworksXidian UniversityXi’anChina
  2. 2.Department of Communications and NetworkingAalto UniversityEspooFinland

Personalised recommendations