Deduplication in cloud outsourced data and providing data confidentiality using identity-based encryption

Document Type : Persian Original Article

Authors

1 Islamic Azad university of Shahrekord

2 Islamic Azad university of shahrekord

Abstract

The demand for data storage and processing is increasing at a rapid speed in the big data era. The management of such tremendous volume of data is a critical challenge. Data deduplication technology is an attractive solution to save storage space and traffic in a big data environment. Another challenge in storing data in cloud computing is security issues such as confidentiality and privacy because users put their personal or confidential data in service providers' data centers. Hence, the best solution for providing data confidentiality is encrypting data before they are outsourced to cloud servers. But the problem is that data encryption makes the different cipher-texts from one plaintext, which makes it difficult to distinguish and remove duplicated data. In this research, in order to solve this conflict, a scheme based on identity-based encryption (IBE) will be proposed. The proposed scheme provides the confidentiality of outsourced data from unreliable entities and especially service providers while data deduplication is also possible.

Keywords


[1]            M. Miller, Cloud computing: Web-based applications that change the way you work and collaborate online. Que publishing, 2008.
[2]             J. Che, Y. Duan, T. Zhang, and J. Fan, “Study on the security models and strategies of cloud computing,” Procedia Eng., vol. 23, pp. 586–593, 2011.
[3]             N. Park and D. J. Lilja, “Characterizing datasets for data deduplication in backup applications,” in Workload Characterization (IISWC), 2010 IEEE International Symposium on, 2010, pp. 1–10.
[4]             P. C. Zikopoulos, C. Eaton, D. DeRoos, T. Deutsch, and G. Lapis, “Understanding big data,” New York al McGraw-Hill, vol. 5, no. 8, 2012.
[5]             C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Infocom, 2010 proceedings ieee, 2010, pp. 1–9.
[6]             M. Wen, S. Yu, J. Li, H. Li, and K. Lu, “Big Data Storage Security,” in Big Data Concepts, Theories, and Applications, Springer, 2016, pp. 237–255.
[7]             P. Puzio and S. Loureiro, “ClouDedup : Secure Deduplication with Encrypted Data for Cloud Storage,” pp. 363–370, 2013.
[8]             V. Rabotka and M. Mannan, “An Evaluation of Recent Secure Deduplication Proposals, Journal of Information Security and Applications, 2016.
[9]           Z. Yan, W. Ding, X. Yu, H. Zhu, and R. H. Deng, “Deduplication on encrypted big data in cloud,” IEEE Trans. big data, vol. 2, no. 2, pp. 138–150, 2016.
[10]          Z. Yan, M. Wang, Y. Li, and A. V Vasilakos, “Encrypted data management with deduplication in cloud computing,” IEEE Cloud Comput., vol. 3, no. 2, pp. 28–35, 2016.
[11]          J. Li, Y. K. Li, X. Chen, P. P. C. Lee, and W. Lou, “A hybrid cloud approach for secure authorized deduplication,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206–1216, 2015.
[12]          Z. Yan, W. Ding, and H. Zhu, “A scheme to manage encrypted data storage with deduplication in cloud,” in International Conference on Algorithms and Architectures for Parallel Processing, 2015, pp. 547–561.
[13]          C.-I. Fan, S.-Y. Huang, and W.-C. Hsu, “Encrypted Data Deduplication in Cloud Storage,” in Information Security (AsiaJCIS), 2015 10th Asia Joint Conference on, 2015, pp. 18–25.
[14]          M. Wen, K. Lu, J. Lei, F. Li, and J. Li, “BDO-SD: An efficient scheme for big data outsourcing with secure deduplication,” in Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on, 2015, pp. 214–219.
[15]      J. Liu, N. Asokan, and B. Pinkas, “Secure deduplication of encrypted data without additional independent servers,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 874–885.
[16]          A. Shamir, “Identity-based cryptosystems and signature schemes.,” in Crypto, 1984, vol. 84, pp. 47–53.
[17]          D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology—CRYPTO 2001, 2001, pp. 213–229.
[18]          G. L. Kreps, “Strategic use of communication to market cancer prevention and control to vulnerable populations,” Health Mark. Q., vol. 25, no. 1–2, pp. 204–216, 2008.
[19]          R. Sakai and M. Kasahara, “ID based Cryptosystems with Pairing on Elliptic Curve.,” IACR Cryptol. ePrint Arch., vol. 2003, p. 54, 2003.
[20]          L. Chen and Z. Cheng, “Security proof of sakai-kasahara’s identity-based encryption scheme,” Lect. notes Comput. Sci., vol. 3796, p. 442, 2005.
[21]        D. Boneh and X. Boyen, “Efficient selective-ID secure identity-based encryption without random oracles,” in International Conference on the Theory and Applications of Cryptographic Techniques, 2004, pp. 223–238.
[22]          A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Computers and communications (ISCC), 2011 IEEE Symposium on, 2011, pp. 850–855.
[23]          K. Keerthana, C. S. Gnanadhas, and R. T. Kumar, “A SURVEY ON MANAGING CLOUD STORAGE USING SECURE DEDUPLICATION,” IIOAB J., vol. 7, no. 9, pp. 656–666, 2016.
[24]      J. Stanek and L. Kencl, “Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage,” IEEE Trans. Dependable Secur. Comput., 2016.