Journal on Communications ›› 2015, Vol. 36 ›› Issue (9): 1-12.doi: 10.11959/j.issn.1000-436x.2015175

• academic paper •     Next Articles

Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership

Yue CHEN1,2,Chao-ling LI3,Ju-long LAN1,4,Kai-chun JIN1,Zhong-hui WANG3   

  1. 1 Faculty of Cyberspace Security,PLA Information Engineering University,Zhengzhou 450001,China
    2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China
    3 PLA 78179 Unit,Dujiangyan 611800,China
    4 National Digital Switching System Engineering & Technological R,D Center,Zhengzhou 450002,China
  • Online:2015-09-25 Published:2017-09-15
  • Supported by:
    The National Basic Research Program of China(973 Program)

Abstract:

To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.

Key words: cloud storage, sensitive data deduplication, proofs of ownership, Merkle hash tree, homomorphic MAC

No Suggested Reading articles found!