Journal on Communications ›› 2016, Vol. 37 ›› Issue (11): 169-180.doi: 10.11959/j.issn.1000-436x.2016238

• Overview • Previous Articles     Next Articles

Research progress on secure data deduplication in cloud

Jin-bo XIONG1,Yuan-yuan ZHANG1,Feng-hua LI2,3(),Su-ping LI1,Jun REN1,Zhi-qiang YAO1,3   

  1. 1 Faculty of Software, Fujian Normal University, Fuzhou 350117, China
    2 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    3 Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou 350117, China
  • Online:2016-11-25 Published:2016-11-30
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Fujian Province;Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund;Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province

Abstract:

In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed. However, the implement of the secure data deduplication was seriously hindered by the ciphertext in cloud. This issue has quickly aroused wide attention of academia and industry, and became a research hotspot. From a security standpoint, firstly the primary cause and the main challenges of secure data deduplication in cloud environment was analyzed, and then the deduplication system model as well as its security model was described. Furthermore, focusing on the realization mechanism of secure data deduplica-tion, the thorough analyses were carried on and reviews for the related research works in recent years from content-based encryption, proof of ownership and privacy protection for secure deduplication, then the advantages and common prob-lems of various key technologies and methods were summed up. Finally, the future research directions and development trends on secure data deduplication in cloud was given.

Key words: secure deduplication, content-based encryption, proof of ownership, privacy protection, data deduplication

No Suggested Reading articles found!