The verifiable secure schemes for resisting attacks in cloud deduplication services

Data deduplication is an impactful technology in cloud storage services which permits the cloud side to save the storage space by eliminating the duplicated data. In this paper, we study the risk of deduplication in cloud storage services. Two typical security issues on how clients can be cheated are demonstrated and analysed. Those attacks may result in data losses to the clients. We therefore propose two mechanisms that make the verification of data deduplication feasible. The proposed verification models can effectively reduce the risk of data deduplication.

[1]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[2]  Jon B. Weissman,et al.  ViDeDup: An Application-Aware Framework for Video De-duplication , 2011, HotStorage.

[3]  Jianfeng Ma,et al.  Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.

[4]  Kai Li,et al.  Avoiding the Disk Bottleneck in the Data Domain Deduplication File System , 2008, FAST.

[5]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[6]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[7]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[8]  André Brinkmann,et al.  Multi-level comparison of data deduplication in a backup scenario , 2009, SYSTOR '09.

[9]  Dutch T. Meyer,et al.  A study of practical deduplication , 2011, TOS.

[10]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[11]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[12]  Michael Vrable,et al.  Cumulus: Filesystem backup to the cloud , 2009, TOS.

[13]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .