Error Control Coding, Second Edition
Error Control Coding, Second Edition
A cooperative internet backup scheme
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Compact Proofs of Retrievability
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Proofs of retrievability: theory and implementation
Proceedings of the 2009 ACM workshop on Cloud computing security
Proofs of Storage from Homomorphic Identification Protocols
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
SAM: A Semantic-Aware Multi-tiered Source De-duplication Framework for Cloud Backup
ICPP '10 Proceedings of the 2010 39th International Conference on Parallel Processing
Remote data checking using provable data possession
ACM Transactions on Information and System Security (TISSEC)
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
IEEE Transactions on Parallel and Distributed Systems
Proofs of ownership in remote storage systems
Proceedings of the 18th ACM conference on Computer and communications security
Secure and efficient proof of storage with deduplication
Proceedings of the second ACM conference on Data and Application Security and Privacy
Private data deduplication protocols in cloud storage
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A secure data deduplication framework for cloud environments
PST '12 Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
Secure Enterprise Data Deduplication in the Cloud
CLOUD '13 Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing
Hi-index | 0.00 |
The cloud computing paradigm is emerging as the next big thing in the world of information technology. Cloud technology offers a completely new set of benefits and savings in terms of computational costs, storage costs, bandwidth and transmission costs to its users. Cloud storage represents one of the most popular cloud services used. Data deduplication is a promising practice which facilitates saving high volumes of storage by allowing the cloud provider to store only a single copy of duplicated data. Client-side data deduplication offers additional savings in terms of bandwidth and storage. Applying data deduplication across enterprises also allows the cloud storage providers to apply data deduplication across users from different domains, providing additional savings. However, some of the advantages of cloud storage may be lost if additional steps are not taken to address some of the security and privacy issues associated with remotely stored data. Since users outsource their data to the cloud, they have to ensure the integrity of their data and its privacy from the cloud storage provider who now has complete access to it. In this paper, we present a solution for assuring data integrity in terms of proof of retrievability and ownership in the context of cross-user client-side data deduplication for medium- and small-sized enterprises. We propose a secure scheme which enables cloud service users to run their proof of retrievability with minimum storage and computational overheads in the case of honest-but-curious cloud storage providers. At the same time, the cloud storage provider will also be able to save digital storage by practising cross-enterprise data deduplication. We extend our scheme to include a proof of ownership scheme to assist the cloud in authenticating the user as the owner of the data before releasing it. Our scheme does not introduce any additional structural or storage overheads to either of the parties.