通信学报 ›› 2016, Vol. 37 ›› Issue (11): 169-180.doi: 10.11959/j.issn.1000-436x.2016238

• 综述 • 上一篇    下一篇

云环境中数据安全去重研究进展

熊金波1,张媛媛1,李凤华2,3(),李素萍1,任君1,姚志强1,3   

  1. 1 福建师范大学软件学院,福建 福州350117
    2 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
    3 福建省公共服务大数据挖掘与应用工程技术研究中心,福建 福州 350117
  • 出版日期:2016-11-25 发布日期:2016-11-30
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;福建省自然科学基金资助项目;福建省网络安全与密码技术重点实验室(福建师范大学)开放课题基金资助项目;福建省高校杰出青年科研人才培育计划基金资助项目

Research progress on secure data deduplication in cloud

Jin-bo XIONG1,Yuan-yuan ZHANG1,Feng-hua LI2,3(),Su-ping LI1,Jun REN1,Zhi-qiang YAO1,3   

  1. 1 Faculty of Software, Fujian Normal University, Fuzhou 350117, China
    2 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    3 Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou 350117, China
  • Online:2016-11-25 Published:2016-11-30
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Fujian Province;Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund;Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province

摘要:

为了提高云存储效率和节约网络通信带宽,需要对云端同一数据的多个副本执行重复性检测与去重操作,而云环境下的密文数据阻碍了数据安全去重的实施,这一问题迅速引起学术界和产业界的广泛关注,成为研究热点。从安全性角度出发,分析云环境中数据安全去重的原因及面临的主要挑战,给出云数据安全去重的系统模型和威胁模型,面向云数据安全去重技术的实现机制从基于内容加密的安全去重、基于所有权证明的安全去重和隐私保护的安全去重3个方面对近年来相关研究工作进行深入分析和评述,并指出各种关键技术与方法的优势及存在的共性问题;最后给出云数据安全去重领域未来的研究方向与发展趋势。

关键词: 安全去重, 基于内容的加密, 所有权证明, 隐私保护, 重复数据删除

Abstract:

In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed. However, the implement of the secure data deduplication was seriously hindered by the ciphertext in cloud. This issue has quickly aroused wide attention of academia and industry, and became a research hotspot. From a security standpoint, firstly the primary cause and the main challenges of secure data deduplication in cloud environment was analyzed, and then the deduplication system model as well as its security model was described. Furthermore, focusing on the realization mechanism of secure data deduplica-tion, the thorough analyses were carried on and reviews for the related research works in recent years from content-based encryption, proof of ownership and privacy protection for secure deduplication, then the advantages and common prob-lems of various key technologies and methods were summed up. Finally, the future research directions and development trends on secure data deduplication in cloud was given.

Key words: secure deduplication, content-based encryption, proof of ownership, privacy protection, data deduplication

No Suggested Reading articles found!