4.5 Article

Secure Distributed Deduplication Systems with Improved Reliability

期刊

IEEE TRANSACTIONS ON COMPUTERS
卷 64, 期 12, 页码 3569-3579

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TC.2015.2401017

关键词

Deduplication; distributed storage system; reliability; secret sharing

资金

  1. Deanship of Scientific Research at King Saud University [RGP-VPP-318]
  2. National Natural Science Foundation of China [61472091, 61472083, U1405255, 61170080, 61272455, U1135004]
  3. 973 Program [2014CB360501]
  4. Natural Science Foundation of Guangdong Province [S2013010013671]
  5. Program for New Century Excellent Talents in Fujian University [JA14067]
  6. Fok Ying Tung Education Foundation [141065]
  7. State Key Laboratory of Integrated Services Networks [ISN15-02]
  8. Australian Research Council (ARC) [DP150103732, DP140103649, LP140100816]

向作者/读者索取更多资源

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable deduplication system. We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous deduplication systems. Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据