DOI QR코드

DOI QR Code

Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage

클라우드 스토리지에서 안전한 중복 제거 기법들에 대한 보안 취약점 분석

  • Park, Ji Sun (Interdisciplinary Program of Information Security, Graduate School, Pukyong National University) ;
  • Shin, Sang Uk (Dept. of IT Convergence and Application Eng., Pukyong National University)
  • Received : 2018.07.09
  • Accepted : 2018.07.23
  • Published : 2018.08.31

Abstract

Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.

Keywords

Acknowledgement

Supported by : Pukyong National University

References

  1. K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, "Deypos: Deduplicatable Dynamic Proof of Storage for Multi-user Environments," IEEE Transactions on Computers, Vol. 65, No. 12, pp. 3631-3645, 2016. https://doi.org/10.1109/TC.2016.2560812
  2. T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W. Lou, "Secure and Efficient Cloud Data Deduplication With Randomized Tag," IEEE Transactions on Information Forensics and Security, Vol. 12, No. 3, pp. 532-543, 2017. https://doi.org/10.1109/TIFS.2016.2622013
  3. Cisco Global Cloud Index: Forecast and Methodology, https://www.cisco.com/c/dam/m/en_us/service-provider/ ciscoknowledgenetwork/files/622_11_15-16-Cisco_GCI_CKN_2015-2020_AMER_EMEAR_NOV2016.pdf (accessed Jun., 18, 2018).
  4. C. Kim, D. Kim, H. Kim, Y. Kim, and D. Seo, "Torus Network Based Distributed Storage System for Massive Multimedia Contents," Journal of Korea Multimedia Society, Vol. 19, No. 8, pp. 1487-1497, 2016. https://doi.org/10.9717/kmms.2016.19.8.1487
  5. Z. Yan, W. Ding, and H. Zhu, "A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud," Proceeding of International Conference on Algorithms and Architectures for Parallel Processing, Vol. 9530, pp. 547-561, 2015.
  6. J. Hur, D. Koo, Y. Shin, and K. Kang, "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage," IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 11, pp. 3113-3125, 2016. https://doi.org/10.1109/TKDE.2016.2580139
  7. Z. Yan, W. Ding, X. Yu, H. Zhu, and R.H. Deng, "Deduplication on Encrypted Big Data in Cloud," IEEE Transactions on Big Data, Vol. 2, No. 2, pp. 138-150, 2016. https://doi.org/10.1109/TBDATA.2016.2587659
  8. C.M. Yu, XDedup: Efficient Provably-secure Cross-user Chunk-level Client-side Deduplicated Cloud Storage of Encrypted Data, International Association for Cryptologic Research Cryptology ePrint Archive: Report 2016/1041, 2016.
  9. D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side Channels in Cloud Services: Deduplication in Cloud Storage," IEEE Security and Privacy, Vol. 8, No. 6, pp. 40-47, 2010.
  10. S. Keelveedhi, M. Bellare, and T. Ristenpart, "DupLESS: Server-aided Encryption for Deduplicated Storage," Proceeding of the 22nd Unix Users Group Security Symposium, pp. 179-194, 2013.
  11. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems," Proceeding of the 18th Association for Computing Machinery Conference on Computer and Communications Security, pp. 491-500, 2011.
  12. M.W. Storer, K. Greenan, D.D. Long, and E.L. Miller, "Secure Data Deduplication," Proceeding of the 4th Association for Computing Machinery International Workshop on Storage Security and Survivability, pp. 1-10, 2008.
  13. J. Liu, N. Asokan, and B. Pinkas, "Secure Deduplication of Encrypted Data without Additional Independent Servers," Proceeding of the 22nd Association for Computing Machinery Special Interest Group on Security, Audit and Control Conference on Computer and Communications Security, pp. 874-885, 2015.