基于Merkle哈希树的云存储加密数据去重复研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Deduplication with encrypted data based on Merkle Hash tree in cloud storage
  • 作者:刘竹松 ; 何喆
  • 英文作者:LIU Zhusong;HE Zhe;School of Computers, Guangdong University of Technology;
  • 关键词:云存储 ; 数据去重复 ; 收敛加密 ; Merkle哈希树
  • 英文关键词:cloud storage;;data deduplication;;convergence encryption;;Merkle Hash tree
  • 中文刊名:JSGG
  • 英文刊名:Computer Engineering and Applications
  • 机构:广东工业大学计算机学院;
  • 出版日期:2017-04-01 08:59
  • 出版单位:计算机工程与应用
  • 年:2018
  • 期:v.54;No.900
  • 基金:国家自然科学基金(No.61572144);; 广东省重大科技专项(No.2016B030306004,No.2015B010110001,No.2014B010117004);; 广州市科技计划项目(No.201508010065)
  • 语种:中文;
  • 页:JSGG201805012
  • 页数:7
  • CN:05
  • 分类号:90-95+126
摘要
收敛加密可以有效地解决数据加密和去重的矛盾,实现安全去重复,但是收敛加密仍然面临许多安全问题。针对传统的收敛加密容易遭受字典攻击的问题,提出基于Merkle哈希树的收敛加密方案实现数据去重复,通过执行额外的加密操作,加强数据的机密性,有效地避免字典攻击。为了克服传统的收敛加密方案的收敛密钥随着用户数量线性增长的问题,设计收敛密钥共享机制,进一步节省了收敛密钥的存储空间。
        Although convergent encryption has effectively solved the contradiction between encryption and deduplication, it still faces many security problems. Aiming at the problem of conventional convergence encryption vulnerable to dictionary attacks, this paper proposes a convergence encryption scheme based on Merkle Hash tree, which realizes data deduplication,strengthens the confidentiality of data and effectively avoids data dictionary attacks by performing additional cryptographic operations. To overcome the problem that convergent keys linearly increase with the number of users, key sharing mechanism is designed, which can reduce more storage space of convergent keys.
引文
[1]Clements A T,Ahmad I,Vilayannur M,et al.Decentralized deduplication in SAN cluster file systems[C]//Usenix Technical Conference,2009.
    [2]Dutch M.Understanding data deduplication ratios[C]//SNIA Data Management Forum,2008.
    [3]Wei J,Jiang H,Zhou K,et al.MAD2:A scalable highthroughput exact deduplication approach for network backup services[C]//IEEE Symposium on MASS Storage Systems and Technologies,2010:1-14.
    [4]Zhang W,Tang H,Jiang H,et al.Multi-level selective deduplication for VM snapshots in cloud storage[C]//2012IEEE Fifth International Conference on Cloud Computing,2012:550-557.
    [5]Zhang Y,Ansari N.On protocol-independent data redundancy elimination[J].IEEE Communications Surveys&Tutorials,2014,16(1):455-472.
    [6]Douceur J R,Adya A,Bolosky W J,et al.Reclaiming space from duplicate files in a serverless distributed file system[C]//International Conference on Distributed Computing Systems,2002:617-624.
    [7]Li J,Chen X,Huang X,et al.Secure distributed deduplication systems with improved reliability[J].IEEE Transactions on Computers,2015,64(12):3569-3579.
    [8]Li J,Chen X,Li M,et al.Secure deduplication with efficient and reliable convergent key management[J].IEEE Transactions on Parallel&Distributed Systems,2014,25(6):1615-1625.
    [9]Anderson P,Zhang L.Fast and secure laptop backups with encrypted de-duplication[C]//International Conference on Large Installation System Administration,2010:1-8.
    [10]Rahumed A,Chen H C H,Tang Y,et al.A secure cloud backup system with assured deletion and version control[C]//ICPPW’11 Proceedings of the 2011 40th International Conference on Parallel Processing Workshops,2011:160-167.
    [11]Storer M W,Greenan K,Long D D E,et al.Secure data deduplication[C]//ACM Workshop on Storage Security and Survivability,Storagess 2008,Alexandria,VA,USA,October,2008:1-10.
    [12]Wilcox-O’Hearn Z,Warner B.Tahoe:The least-authority file system[C]//ACM Workshop on Storage Security and Survivability,Storagess 2008,Alexandria,VA,USA,October,2008:21-26.
    [13]Bellare M,Keelveedhi S,Ristenpart T.Message-locked encryption and secure deduplication[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Heidelberg:Springer,2013:296-312.
    [14]Abadi M,Boneh D,Mironov I,et al.Message-locked encryption for lock-dependent messages[M]//Advances in Cryptology-CRYPTO 2013.Berlin,Heidelberg:Springer,2013:374-391.
    [15]Stanek J,Sorniotti A,Androulaki E,et al.A secure data deduplication scheme for cloud storage[M]//Financial Cryptography and Data Security.Berlin Heidelberg:Springer,2014:99-118.
    [16]Bellare M,Keelveedhi S,Ristenpart T.Dup LESS:Serveraided encryption for deduplicated storage[C]//Usenix Conference on Security,2013:179-194.
    [17]Duan Y.Distributed key generation for encrypted deduplication:Achieving the strongest privacy[C]//Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security,2014:57-68.
    [18]Li J,Li Y K,Chen X,et al.A hybrid cloud approach for secure authorized deduplication[J].IEEE Transactions on Parallel and Distributed Systems,2015,26(5):1206-1216.
    [19]Telkar S A,Shaikh M Z.Enhanced secured hybrid cloudedupe system for data deduplication[J].International Journal of Innovations&Advancement in Computer Science,2015,4(4).
    [20]Halevi S,Harnik D,Pinkas B,et al.Proofs of ownership in remote storage systems[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security,2011:491-500.
    [21]Puzio P,Molva R,Onen M,et al.Block-level de-duplication with encrypted data[J].Ronpub Ug,2014,1:10-18.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700