scispace - formally typeset
Book ChapterDOI

Policy-Based De-duplication in Secure Cloud Storage

Reads0
Chats0
TLDR
A policy-based de-duplication proxy scheme to enable different trust relations among cloud storage components, de- duplication related components and different security requirements is proposed and a key management mechanism to access and decrypt the shared de- DUplicated data chunks based on Proxy Re-encryption algorithms is proposed.
Abstract
Reducing the amount of data need to be transferred, stored, and managed becomes a crucial for cloud storage. On the other hand, as user data are stored and processed by outsourced cloud provider, encryption becomes a necessary before updating data into the cloud. However, the above two goals are greatly opposed to each other. In order to solve the above conflict, a policy-based de-duplication proxy scheme is proposed in this paper. It suggests a policy-based de-duplication proxy scheme to enable different trust relations among cloud storage components, de-duplication related components and different security requirements. Further proposes a key management mechanism to access and decrypt the shared de-duplicated data chunks based on Proxy Re-encryption algorithms. This paper finally analyses the security of the scheme.

read more

Citations
More filters
Proceedings ArticleDOI

ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

TL;DR: ClouDedup is proposed, a secure and efficient storage service which assures block-level deduplication and data confidentiality at the same time and remains secure thanks to the definition of a component that implements an additional encryption operation and an access control mechanism.
Journal ArticleDOI

Data deduplication techniques for efficient cloud storage management: a systematic review

TL;DR: This paper investigates deduplication techniques based on text and multimedia data along with their corresponding taxonomies as these techniques have different challenges for duplicate data detection.
Journal ArticleDOI

Proxy Re-Encryption

TL;DR: This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives.
Book ChapterDOI

PerfectDedup: Secure Data Deduplication

TL;DR: PerfectDedup is proposed, a novel scheme for secure data deduplication, which takes into account the popularity of the data segments and leverages the properties of Perfect Hashing in order to assure block-level dedUplication and data confidentiality at the same time.
Book ChapterDOI

A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud

TL;DR: This paper proposes a scheme to deduplicate encrypted data stored in cloud based on proxy re-encryption based on extensive analysis and implementation and shows the efficiency and effectiveness of the scheme for potential practical deployment.
References
More filters
Journal ArticleDOI

Summary cache: a scalable wide-area web cache sharing protocol

TL;DR: This paper demonstrates the benefits of cache sharing, measures the overhead of the existing protocols, and proposes a new protocol called "summary cache", which reduces the number of intercache protocol messages, reduces the bandwidth consumption, and eliminates 30% to 95% of the protocol CPU overhead, all while maintaining almost the same cache hit ratios as ICP.
Journal ArticleDOI

Improved proxy re-encryption schemes with applications to secure distributed storage

TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI

Divertible protocols and atomic proxy cryptography

TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Proceedings Article

Avoiding the disk bottleneck in the data domain deduplication file system

TL;DR: Three techniques employed in the production Data Domain deduplication file system to relieve the disk bottleneck are described, which enable a modern two-socket dual-core system to run at 90% CPU utilization with only one shelf of 15 disks and achieve 100 MB/sec for single-stream throughput and 210 MB/ sec for multi- stream throughput.
Proceedings ArticleDOI

Probabilistic encryption & how to play mental poker keeping secret all partial information

TL;DR: This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, cannot obtain any information about the clear-text.
Related Papers (5)