Corpus ID: 47007741

A Secure Approach for Deduplication using Hybrid Cloud

  title={A Secure Approach for Deduplication using Hybrid Cloud},
  author={Yusuf Aliyu Adamu},
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this study makes the first attempt to formally address the problem of… Expand

Figures from this paper


A Secure Data Deduplication Scheme for Cloud Storage
This work designs an encryption scheme that guarantees semantic security for unpopular data and provides weaker security and better storage and bandwidth benefits for popular data, and shows that the scheme is secure under the Symmetric External Decisional Diffie-Hellman Assumption in the random oracle model. Expand
Secure and constant cost public cloud storage auditing with deduplication
This paper proposes a novel scheme based on techniques including polynomial-based authentication tags and homomorphic linear authenticators that outperforms existing POR and PDP schemes while providing the additional functionality of deduplication. Expand
DupLESS: Server-Aided Encryption for Deduplicated Storage
It is shown that encryption for deduplicated storage can achieve performance and space savings close to that of using the storage service with plaintext data. Expand
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
A secure client-side deduplication scheme, with the following advantages: the scheme protects data confidentiality (and some partial information) against both outside adversaries and honest-but-curious cloud storage server, while Halevi et al. trusts cloudstorage server in data confidentiality; the scheme is proved secure w.r.t. any distribution with sufficient min-entropy. Expand
Private data deduplication protocols in cloud storage
It is shown that the proposed private data deduplication protocol is provably secure assuming that the underlying hash function is collision-resilient, the discrete logarithm is hard and the erasure coding algorithm can erasure up to α-fraction of the bits in the presence of malicious adversaries. Expand
Message-Locked Encryption and Secure Deduplication
The work shows that MLE is a primitive of both practical and theoretical interest, and makes connections with deterministic encryption, hash functions secure on correlated inputs and the sample-then-extract paradigm to deliver schemes under different assumptions and for different classes of message sources. Expand
Twin Clouds: An Architecture for Secure Cloud Computing
This paper proposes an architecture for secure outsourcing of data and arbitrary computations to an untrusted commodity cloud which split the computations such that the trusted cloud is mostly used for security-critical operations in the less time-critical setup phase, whereas queries to the outsourced data are processed in parallel by the fast commodity cloud on encrypted data. Expand
Proofs of ownership in remote storage systems
This work identifies attacks that exploit client-side deduplication, allowing an attacker to gain access to arbitrary-size files of other users based on a very small hash signatures of these files, and introduces the notion of proofs-of-ownership (PoWs), which lets a client efficiently prove to a server that that the client holds a file, rather than just some short information about it. Expand
Fast and Secure Laptop Backups with Encrypted De-duplication
This paper describes an algorithm which takes advantage of the data which is common between users to increase the speed of backups, and reduce the storage requirements, and describes a prototype implementation of this algorithm for Apple OS X. Expand
Boosting efficiency and security in proof of ownership for deduplication
A novel Proof of Ownership (POW) scheme is introduced that has all features of the state-of-the-art solution while incurring only a fraction of the overhead experienced by the competitor. Expand