Advanced SearchSearch Tips
Encrypted Data Deduplication Using Key Issuing Server
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of KIISE
  • Volume 43, Issue 2,  2016, pp.143-151
  • Publisher : Korean Institute of Information Scientists and Engineers
  • DOI : 10.5626/JOK.2016.43.2.143
 Title & Authors
Encrypted Data Deduplication Using Key Issuing Server
Kim, Hyun-il; Park, Cheolhee; Hong, Dowon; Seo, Changho;
Data deduplication is an important technique for cloud storage savings. These techniques are especially important for encrypted data because data deduplication over plaintext is basically vulnerable for data confidentiality. We examined encrypted data deduplication with the aid of a key issuing server and compared Convergent Encryption with a technique created by M.Bellare et al. In addition, we implemented this technique over not only Dropbox but also an open cloud storage service, Openstack Swift. We measured the performance for this technique over Dropbox and Openstack Swift. According to our results, we verified that the encrypted data deduplication technique with the aid of a key issuing server is a feasible and versatile method.
encrypted data deduplication;key distribution protocol;DupLESS;openstack swift;
 Cited by
S. Halevi, D. Harnik, B. Pinkas, A. Shulman-Peleg, "Proofs of ownership in remote storage systems," Proc. of the 18th ACM conference on Computer and communications security, ACM, pp. 491-500, Oct. 2011.

J. Douceur, A. Adya, W. Bolosky, D. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on. IEEE, pp. 617-624, 2002.

M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-Locked Encryption and Secure Deduplication," Advances in Cryptology-EUROCRYPT, pp. 296-312, 2013.

M. Bellare, S. Keelveedhi, and T. Ristenpart, "Dup-LESS : Server-Aided Encryption for Deduplicated Storage," Proc. of the 22nd USENIX conference on security, pp. 179-194, 2013.

Dropbox. [Online]. Available:

Openstack, wikipedia. [Online]. Available:

SAIO - Swift All In One. [Online]. Available:

Python. [Online]. Available:

Google Drive. [Online]. Available:

Dropbox API. [Online]. Available:

P. Rogaway, and T. Shrimpton, "A provable-security treatment of the key-wrap problem," Advances in Cryptology-EUROCRYPT, pp. 373-390, 2006.

Wirehark. [Online]. Available: