4.7 Article

Secure and Efficient Cloud Data Deduplication With Randomized Tag

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2016.2622013

Keywords

Deduplication; convergent encryption; message-locked encryption; interactive protocol

Funding

  1. National Natural Science Foundation of China [61572382, U1405255]
  2. China 111 Project [B16037]
  3. Doctoral Fund of Ministry of Education of China [20130203110004]
  4. Program for New Century Excellent Talents in University [NCET-13-0946]
  5. Fundamental Research Funds for the Central Universities [BDY151402]
  6. National High Technology Research and Development Program (863 Program) of China [2015AA016007]
  7. U.S. National Science Foundation [CNS-1217889, CNS-1446479]

Ask authors/readers for more resources

Cross-client data deduplication has been widely used to eliminate redundant storage overhead in cloud storage system. Recently, Abadi et al. introduced the primitive of MLE2 with nice security properties for secure and efficient data deduplication. However, besides the computationally expensive noninteractive zero-knowledge proofs, their fully randomized scheme (R-MLE2) requires the inefficient equality-testing algorithm to identify all duplicate ciphertexts. Thus, an interesting challenging problem is how to reduce the overhead of R-MLE2 and propose an efficient construction for R-MLE2. In this paper, we introduce a new primitive called mu R-MLE2, which gives a partial positive answer for this challenging problem. We propose two schemes: static scheme and dynamic scheme, where the latter one allows tree adjustment by increasing some computation cost. Our main trick is to use the interactive protocol based on static or dynamic decision trees. The advantage gained from it is, by interacting with clients, the server will reduce the time complexity of deduplication equality test from linear time to efficient logarithmic time over the whole data items in the database. The security analysis and the performance evaluation show that our schemes are Path-PRV-CDA2 secure and achieve several orders of magnitude higher performance for data equality test than R-MLE2 scheme when the number of data items is relatively large.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available