Secure proof of storage with deduplication for cloud storage systems

Youngjoo Shin, Dongyoung Koo, Junbeom Hur, Joobeom Yun

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.

Original languageEnglish
Pages (from-to)19363-19378
Number of pages16
JournalMultimedia Tools and Applications
Volume76
Issue number19
DOIs
Publication statusPublished - 2017 Oct 1

Fingerprint

Cloud computing
Data privacy
Outsourcing
Explosions

Keywords

  • Cloud computing
  • Cloud storage
  • Data deduplication
  • Multimedia content security
  • Proof of data possession
  • Proof of ownership
  • Proof of retrievability

ASJC Scopus subject areas

  • Software
  • Media Technology
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Secure proof of storage with deduplication for cloud storage systems. / Shin, Youngjoo; Koo, Dongyoung; Hur, Junbeom; Yun, Joobeom.

In: Multimedia Tools and Applications, Vol. 76, No. 19, 01.10.2017, p. 19363-19378.

Research output: Contribution to journalArticle

Shin, Youngjoo ; Koo, Dongyoung ; Hur, Junbeom ; Yun, Joobeom. / Secure proof of storage with deduplication for cloud storage systems. In: Multimedia Tools and Applications. 2017 ; Vol. 76, No. 19. pp. 19363-19378.
@article{18dedd6eeeda4812a0b1ab0f66f2c54b,
title = "Secure proof of storage with deduplication for cloud storage systems",
abstract = "Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.",
keywords = "Cloud computing, Cloud storage, Data deduplication, Multimedia content security, Proof of data possession, Proof of ownership, Proof of retrievability",
author = "Youngjoo Shin and Dongyoung Koo and Junbeom Hur and Joobeom Yun",
year = "2017",
month = "10",
day = "1",
doi = "10.1007/s11042-015-2956-z",
language = "English",
volume = "76",
pages = "19363--19378",
journal = "Multimedia Tools and Applications",
issn = "1380-7501",
publisher = "Springer Netherlands",
number = "19",

}

TY - JOUR

T1 - Secure proof of storage with deduplication for cloud storage systems

AU - Shin, Youngjoo

AU - Koo, Dongyoung

AU - Hur, Junbeom

AU - Yun, Joobeom

PY - 2017/10/1

Y1 - 2017/10/1

N2 - Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.

AB - Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.

KW - Cloud computing

KW - Cloud storage

KW - Data deduplication

KW - Multimedia content security

KW - Proof of data possession

KW - Proof of ownership

KW - Proof of retrievability

UR - http://www.scopus.com/inward/record.url?scp=84944706846&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84944706846&partnerID=8YFLogxK

U2 - 10.1007/s11042-015-2956-z

DO - 10.1007/s11042-015-2956-z

M3 - Article

AN - SCOPUS:84944706846

VL - 76

SP - 19363

EP - 19378

JO - Multimedia Tools and Applications

JF - Multimedia Tools and Applications

SN - 1380-7501

IS - 19

ER -