DOI QR코드

DOI QR Code

Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter

  • Yan, Xi-ai (Dept. of Information Technology, Hunan Police Academy) ;
  • Shi, Wei-qi (Dept. of Information Technology, Hunan Police Academy) ;
  • Tian, Hua (Dept. of Information Technology, Hunan Police Academy)
  • Received : 2019.03.08
  • Accepted : 2019.09.11
  • Published : 2019.12.31

Abstract

Data deduplication is a common method to improve cloud storage efficiency and save network communication bandwidth, but it also brings a series of problems such as privacy disclosure and dictionary attacks. This paper proposes a secure deduplication scheme for cloud storage based on Bloom filter, and dynamically extends the standard Bloom filter. A public dynamic Bloom filter array (PDBFA) is constructed, which improves the efficiency of ownership proof, realizes the fast detection of duplicate data blocks and reduces the false positive rate of the system. In addition, in the process of file encryption and upload, the convergent key is encrypted twice, which can effectively prevent violent dictionary attacks. The experimental results show that the PDBFA scheme has the characteristics of low computational overhead and low false positive rate.

Keywords

References

  1. Cisco Global cloud index [Online]. Available: https://www.cisco.com/c/dam/assets/sol/sp/gci/global-cloud-index-infographic.html.
  2. J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," in Proceedings 22nd International Conference on Distributed Computing Systems, Vienna, Austria, 2002, pp. 617-624.
  3. M. Li, C. Qin, and P. P. Lee, "CDStore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal," in Proceedings of 2015 USENIX Annual Technical Conference, Santa Clara, CA, 2015, pp. 111-124.
  4. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, "A secure data deduplication scheme for cloud storage," in Financial Cryptography and Data Security. Heidelberg: Springer, 2014, pp. 99-118.
  5. P. Puzio, R. Molva, M. Onen, and S. Loureiro, "PerfectDedup: secure data deduplication," in Data Privacy Management, and Security Assurance. Cham: Springer, 2015, pp. 150-166.
  6. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proceedings of the 18th ACM Conferenceon Computer and Communications Security, Chicago, IL, 2011, pp. 491-500.
  7. J. Xu, E. C. Chang, and J. Zhou, "Weak leakage-resilient client-side deduplication of encrypted data in cloud storage," in Proceedings of the 8th ACM SIGSAC SymposiumonInformati on, Computerand Communications Security, Hangzhou, China, 2013, pp. 195-206.
  8. R. Di Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication," in Proceedings of the 7th ACM Symposium on Information, Computerand Communications Security, Seoul, Korea, 2012, pp. 81-82.
  9. J. Blasco, R. Di Pietro, A. Orfila, and A. Sorniotti, "A tunable proof of ownership scheme for deduplication using bloom filters," in Proceedings of 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, 2014, pp. 481-489.
  10. Z. Liu and Z. Yang, "Efficient and secure deduplication cloud storage scheme based on proof of ownership by Bloom filter," Journal of Computer Applications, vol. 37, no. 3, pp. 766-770, 2017.
  11. W. Li, D. F. Zhang, K. Huang, and K. Xie, "Accurate multi-dimension counting Bloom filter for big data processing," Chinese Journal of Electronics, vol. 43, no. 4, pp. 652-657, 2015.
  12. K. Xie and W. Shi, "PPIBF: a privacy preservation invertible Bloom filter," Computer Engineering & Science, vol. 39, no. 6, pp. 1104-1111, 2017.
  13. J. Zhao, Z. Hu, B. Xiong, and K. Li, "Accelerating packet classification with counting bloom filters for virtual openflow switching," China Communications, vol. 15, no. 10, pp. 117-128, 2018. https://doi.org/10.1109/CC.2018.8485474
  14. Y. Li and Z. Xiang, "Ciphertext retrieval ranking method based on counting Bloom filter," Journal of Computer Applications, vol. 38, no. 9, pp. 2554-2559, 2018
  15. E. Zhang and G. Jin, "Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and Bloom filter," Journal of Computer Applications, vol. 38, no. 8, pp. 2256-2260, 2018.
  16. S. Dharmapurikar, P. Krishnamurthy, and D. E. Taylor, "Longest prefix matching using bloom filters," IEEE/ACM Transactions on Networking, vol.14, no. 2, pp. 397-409, 2006. https://doi.org/10.1109/TNET.2006.872576
  17. C. M. Tseng, J. R. Ciou, and T. J. Liu, "A cluster-based data de-duplication technology," in Proceedings of the 2nd International Symposium on Computing and Networking, Shizuoka, Japan, 2014, pp. 226-230.
  18. J. Xiong, Y. Zhang, F. Li, S. Li, J. Ren, and Z. Yao, "Research progress on secure data deduplication in cloud," Journal on Communications, vol.37, no. 11, pp. 169-180, 2016.
  19. P. Anderson and L. Zhang, "Fast and secure laptop backups with encrypted de-duplication," in Proceedings of the 24th Large Installation System Administration(LISA), San Jose, CA, 2010.
  20. L. Gonzalez-Manzano and A. Orfila, "An efficient confidentiality-preserving proof of ownership for deduplication," Journal of Network and Computer Applications, vol. 50, pp. 49-59, 2015. https://doi.org/10.1016/j.jnca.2014.12.004