Skip to main navigation Skip to search Skip to main content

Secure and Efficient Cloud Data Deduplication with Randomized Tag

  • Tao Jiang
  • , Xiaofeng Chen*
  • , Qianhong Wu
  • , Jianfeng Ma
  • , Willy Susilo
  • , Wenjing Lou
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Cross-client data deduplication has been widely used to eliminate redundant storage overhead in cloud storage system. Recently, Abadi et al. introduced the primitive of MLE2 with nice security properties for secure and efficient data deduplication. However, besides the computationally expensive non-interactive zero-knowledge proofs, their fully randomized scheme (R-MLE2) requires the inefficient equality-testing algorithm to identify all duplicate ciphertexts. Thus, an interesting challenging problem is how to reduce the overhead of R-MLE2 and propose an efficient construction for R-MLE2. In this paper, we introduce a new primitive called μR-MLE2, which gives a partial positive answer for this challenging problem. We propose two schemes: static scheme and dynamic scheme, where the latter one allows tree adjustment by increasing some computation cost. Our main trick is to use the interactive protocol based on static or dynamic decision trees. The advantage gained from it is, by interacting with clients, the server will reduce the time complexity of deduplication equality test from linear time to efficient logarithmic time over the whole data items in the database. The security analysis and the performance evaluation show that our schemes are Path-PRV-CDA2 secure and achieve several orders of magnitude higher performance for data equality test than R-MLE2 scheme when the number of data items is relatively large.

Original languageEnglish
Article number7707339
Pages (from-to)532-543
Number of pages12
JournalIEEE Transactions on Information Forensics and Security
Volume12
Issue number3
DOIs
StatePublished - Mar 2017

Keywords

  • Deduplication
  • convergent encryption
  • interactive protocol
  • message-locked encryption

Fingerprint

Dive into the research topics of 'Secure and Efficient Cloud Data Deduplication with Randomized Tag'. Together they form a unique fingerprint.

Cite this