4.5 Article

Secure Distributed Deduplication Systems with Improved Reliability

Journal

IEEE TRANSACTIONS ON COMPUTERS
Volume 64, Issue 12, Pages 3569-3579

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TC.2015.2401017

Keywords

Deduplication; distributed storage system; reliability; secret sharing

Funding

  1. Deanship of Scientific Research at King Saud University [RGP-VPP-318]
  2. National Natural Science Foundation of China [61472091, 61472083, U1405255, 61170080, 61272455, U1135004]
  3. 973 Program [2014CB360501]
  4. Natural Science Foundation of Guangdong Province [S2013010013671]
  5. Program for New Century Excellent Talents in Fujian University [JA14067]
  6. Fok Ying Tung Education Foundation [141065]
  7. State Key Laboratory of Integrated Services Networks [ISN15-02]
  8. Australian Research Council (ARC) [DP150103732, DP140103649, LP140100816]

Ask authors/readers for more resources

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable deduplication system. We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous deduplication systems. Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available