Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership

To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Ded...

Full description

Saved in:
Bibliographic Details
Main Authors: Yue CHEN, Chao-ling LI, Ju-long LAN, Kai-chun JIN, Zhong-hui WANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539665965875200
author Yue CHEN
Chao-ling LI
Ju-long LAN
Kai-chun JIN
Zhong-hui WANG
author_facet Yue CHEN
Chao-ling LI
Ju-long LAN
Kai-chun JIN
Zhong-hui WANG
author_sort Yue CHEN
collection DOAJ
description To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.
format Article
id doaj-art-7fc4e7d0dfb94a04a2a798c363c6518d
institution Kabale University
issn 1000-436X
language zho
publishDate 2015-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-7fc4e7d0dfb94a04a2a798c363c6518d2025-01-14T06:53:29ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-09-013611259695274Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownershipYue CHENChao-ling LIJu-long LANKai-chun JINZhong-hui WANGTo solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/cloud storagesensitive data deduplicationproofs of ownershipMerkle hash treehomomorphic MAC
spellingShingle Yue CHEN
Chao-ling LI
Ju-long LAN
Kai-chun JIN
Zhong-hui WANG
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
Tongxin xuebao
cloud storage
sensitive data deduplication
proofs of ownership
Merkle hash tree
homomorphic MAC
title Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
title_full Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
title_fullStr Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
title_full_unstemmed Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
title_short Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
title_sort secure sensitive data deduplication schemes based on deterministic probabilistic proof of file ownership
topic cloud storage
sensitive data deduplication
proofs of ownership
Merkle hash tree
homomorphic MAC
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/
work_keys_str_mv AT yuechen securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership
AT chaolingli securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership
AT julonglan securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership
AT kaichunjin securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership
AT zhonghuiwang securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership