2021
DOI: 10.3390/info12040142
|View full text |Cite
|
Sign up to set email alerts
|

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

Abstract: By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problematic as encryption performed by different data owners may differentiate identical data which may then become not deduplicable. The Message-Locked Encryption (MLE) is thus utilized to derive the same encryption key for the identical data, by which the encrypted dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 53 publications
0
4
0
Order By: Relevance
“…You et al [49] proposed the rst deduplicationfriendly watermarking scheme for multimedia data in public clouds, in which the data integrity can be checked by the cloud server without having access to the original data. A proof of ownership for encrypted les is proposed [50] by recruiting the rst data owner to assist later data integrity checking. However, in order to continuously check data integrity, the users must keep online and perform data integrity checking frequently via PoS protocols, which is cumbersome for users and unrealistic in practice.…”
Section: Outsourced Data Integritymentioning
confidence: 99%
“…You et al [49] proposed the rst deduplicationfriendly watermarking scheme for multimedia data in public clouds, in which the data integrity can be checked by the cloud server without having access to the original data. A proof of ownership for encrypted les is proposed [50] by recruiting the rst data owner to assist later data integrity checking. However, in order to continuously check data integrity, the users must keep online and perform data integrity checking frequently via PoS protocols, which is cumbersome for users and unrealistic in practice.…”
Section: Outsourced Data Integritymentioning
confidence: 99%
“…Data deduplication techniques can benefit from convergent encryption (CE) to achieve security smoothly and more easily [10,15]. Convergent encryption is a cryptographic concept that ensures security in the cloud by achieving confidentiality and data privacy.…”
Section: B Convergent Encryptionmentioning
confidence: 99%
“…Data deduplication is an effective mechanism that aims at reducing the required storage space of the cloud storage servers by avoiding storing several copies of the same data. There are two main types of deduplication [9,10] namely, server-side deduplication and client-side deduplication. The server-side deduplication schemes [11,12] remove duplicated copies of the same files after uploading them to the server.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation