logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 3: 032107(2018) https://doi.org/10.1007/s11432-017-9116-x

Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication

More info
  • ReceivedJan 5, 2017
  • AcceptedMay 10, 2017
  • PublishedNov 13, 2017

Abstract

In storage service, data de-duplication is a specialized technique for eliminating duplicate copies of repeating data in storage. Especially, client-side de-duplication has more merits than server-side de-duplication since they can improve both the space efficiency and the communication bandwidth. For secure client-side de-duplication, we need a way to prove the ownership of a file to be stored. In the upload step, the server should verify the ownership of a client to give the right of the file without uploading it. On the contrary, the client also want to verify the retrievability for the file since he will delete it from his storage after protocol execution. Existing proof of ownership techniques have been designed for server's need. In this paper, we first point out that we need the second property in client's view point, and give a very simple and practical solution which can support the server and the client to prove that they have the same file. We first describe a generic strategy which can help us to construction a bi-directional and concurrent proof of ownership technique from an ordinary proof of ownership technique, and then give an efficient hash-based scheme with security proof in the random oracle model.


Acknowledgment

This work was supported by Electronics and Telecommunications Research Institute (ETRI) grant funded by the Korean government (17ZH1700, Development of Storage and Search Technologies over Encrypted Database).


References

[1] Bellare M, Keelveedhi S, Ristenpart T. Message-locked encryption and secure deduplication. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, 2013. 296--312. Google Scholar

[2] Bellare M, Keelveedhi S, Ristenpart T. DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd USENIX Conference on Security, Washington DC, 2013. 179--194. Google Scholar

[3] Douceur J R, Adya A, Bolosky W J, et al. Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings of International Conference on Distributed Computing Systems, Vienna, 2002. 617--624. Google Scholar

[4] Harnik D, Pinkas B, Shulman-Peleg A. Side channels in cloud services: deduplication in cloud storage. IEEE Secur Privacy Mag, 2010, 8: 40--47. Google Scholar

[5] Li J, Chen X, Li M. Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans Parallel Distrib Syst, 2014, 25: 1615-1625 CrossRef Google Scholar

[6] Li J, Chen X, Xhafa F, et al. Secure deduplication storage systems with keyword search. In: Proceedings of IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), Gwangju, 2014. 971--977. Google Scholar

[7] Li J, Li Y K, Chen X. A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Trans Parallel Distrib Syst, 2015, 26: 1206-1216 CrossRef Google Scholar

[8] Marques L, Costa C. Secure deduplication on mobile devices. In: Proceedings of the 2011 Workshop on Open Source and Design of Communication, Lisbon, 2011. 19--26. Google Scholar

[9] Shin Y, Kim K. Efficient and Secure File Deduplication in Cloud Storage. IEICE Trans Inf ^^ Syst, 2014, E97.D: 184-197 CrossRef ADS Google Scholar

[10] Storer M, Greenan K, Long D, et al. Secure data deduplication. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, Alexandria, 2008. 1--10. Google Scholar

[11] Xu J, Chang E C, Zhou J Y. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: Proceedings of ASIA-CCS 2013, Hangzhou, 2013. 195--206. Google Scholar

[12] Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, 2009. 319--333. Google Scholar

[13] Ateniese G, Pietro R D, Mancini L, et al. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, Istanbul, 2008. 9. Google Scholar

[14] Bowers K D, Juels A, Oprea A. Proofs of retrievability: theory and implementation. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, 2009. 43--54. Google Scholar

[15] Blasco J, Pietro R D, Orfila A, et al. A tunable proof of ownership scheme for deduplication using bloom filters. In: Proceedings of the IEEE Conference on Communications and Network Security (CNS), San Francisco, 2014. 481--489. Google Scholar

[16] Chen J, Zhang L, He K. Message-locked proof of ownership and retrievability with remote repairing in cloud. Security Comm Networks, 2016, 9: 3452-3466 CrossRef Google Scholar

[17] Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: Proceedings of Theory of Cryptography Conference, San Francisco, 2009. 109--127. Google Scholar

[18] Halevi S, Harnik D, Pinkas B, et al. Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, 2011. 491--500. Google Scholar

[19] Husain M I, Ko S Y, Uurtamo S. Bidirectional data verification for cloud storage. J Network Comput Appl, 2014, 45: 96-107 CrossRef Google Scholar

[20] Juels A, Kaliski B. PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, 2007. 584--597. Google Scholar

[21] Pietro R D, Sorniotti A. Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Seoul, 2012. 81--82. Google Scholar

[22] Rass S. Dynamic proofs of retrievability from Chameleon-Hashes. In: Proceedings of International Conference on Security and Cryptography (SECRYPT), Reykjavik, 2013. 1--9. Google Scholar

[23] Xu J, Zhou J. Leakage resilient proofs of ownership in cloud storage, revisited. In: Proceedings of International Conference on Applied Cryptography and Network Security, Lausanne, 2014. 97--115. Google Scholar

[24] Yu C, Chen C, Chao H. Proof of ownership in deduplicated cloud storage with mobile device efficiency. IEEE Network, 2015, 29: 51-55 CrossRef Google Scholar

[25] Wang H, Zhu L, Xu C. A universal method for realizing non-repudiable provable data possession in cloud storage. Security Comm Networks, 2016, 9: 2291-2301 CrossRef Google Scholar

[26] Armknecht F, Bohli J-M, Karame G O, et al. Outsourced proofs of retrievability. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 2014. 831--843. Google Scholar

[27] Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, 2007. 598--609. Google Scholar

[28] Shacham H, Waters B. Compact proofs of retrievability. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, 2008. 90--107. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1