4.7 Article

A Hybrid Cloud Approach for Secure Authorized Deduplication

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TPDS.2014.2318320

关键词

Deduplication; authorized duplicate check; confidentiality; hybrid cloud

资金

  1. National Natural Science Foundation of China [61100224, 61272455]
  2. GRF CUHK from the Research Grant Council of Hong Kong [413813]
  3. Distinguished Young Scholars Fund of Department of Education [Yq2013126]
  4. Guangdong Province
  5. Natural Science Foundation of Guangdong Province [S2013010013671]
  6. Guangzhou Zhujiang Science and Technology Future Fellow Fund [2012J2200094]
  7. China 111 Project [B08038]
  8. Ministry of Education of China [20130203110004]
  9. Program for New Century Excellent Talents in University [NCET-13-0946]
  10. Fundamental Research Funds for the Central Universities [BDY15]
  11. US National Science Foundation [CNS-1217889]
  12. Direct For Computer & Info Scie & Enginr
  13. Division Of Computer and Network Systems [1217889] Funding Source: National Science Foundation

向作者/读者索取更多资源

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before out-sourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据