2020
DOI: 10.1109/access.2020.3023387
|View full text |Cite
|
Sign up to set email alerts
|

SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating

Abstract: Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult. Current solutions rely heavily on trusted third parties, and do not address the popularity of data, resulting in unsatisfying security and efficiency. A secure encrypted data deduplication scheme based on data popularity is proposed. Check tags are calculated via bilinear mapping to determine whether different encrypted data originate from the same plainte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 34 publications
(38 reference statements)
0
11
0
Order By: Relevance
“…Along with the growth of Internet users, new security issues arise while traditional security issues become more severe [5]. On one hand, the new paradigms could bring facilities and impressive experiences, such as data forecasting [6], content sharing [7] [8] and computation offloading [9]. On the other hand, the challenge of defense strategy is elevated, and sophisticated protection mechanism should be involved in every aspect from end devices to infrastructures, e.g., mobile devices [10], edge server [11], cloud data center [12] [13], and blockchain [14].…”
Section: Related Work a Privacy Leakage And Protectionmentioning
confidence: 99%
“…Along with the growth of Internet users, new security issues arise while traditional security issues become more severe [5]. On one hand, the new paradigms could bring facilities and impressive experiences, such as data forecasting [6], content sharing [7] [8] and computation offloading [9]. On the other hand, the challenge of defense strategy is elevated, and sophisticated protection mechanism should be involved in every aspect from end devices to infrastructures, e.g., mobile devices [10], edge server [11], cloud data center [12] [13], and blockchain [14].…”
Section: Related Work a Privacy Leakage And Protectionmentioning
confidence: 99%
“…1. Total compression rates for different chunk sizes using Bonsai (this work), Yggdrasil [10], SecDedup [15], Brotli [3], and combination of these techniques (lower is better).…”
Section: Compression Ratementioning
confidence: 99%
“…Finally, to showcase the performance impact of Bonsai on a cloud storage system, we used a DVI dataset of 10 GB and collected simulations for compression ratios achieved by Bonsai, Yggrdasil [10], data deduplication (DD) [15], and Brotli [3]. The comparison is illustrated in Fig.…”
Section: Compression Ratementioning
confidence: 99%
See 1 more Smart Citation
“…Second, to address dynamic ownership management, many schemes [4], [15]- [19] were proposed by using either trusted third party or semi-trusted third party to do proxy reencryption work, such as Authority Party (AP ) or The Public Cloud Provider (P ub − CSP ). On the one hand, it could be difficult to implement a trusted third party in practical applications [20]. On the other hand, some schemes can not resist collusion attacks when the third party colludes with unauthorized users.…”
Section: Introductionmentioning
confidence: 99%