Survey of secure data deduplication schemes for cloud storage systems

Youngjoo Shin, Dongyoung Koo, Junbeom Hur

Research output: Contribution to journalArticle

29 Citations (Scopus)

Abstract

Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly accepted, it comes with many security and privacy problems due to the outsourced data delivery models of cloud storage. To deal with specific security and privacy issues, secure deduplication techniques have been proposed for cloud data, leading to a diverse range of solutions and trade-offs. Hence, in this article, we discuss ongoing research on secure deduplication for cloud data in consideration of the attack scenarios exploited most widely in cloud storage. On the basis of classification of deduplication system, we explore security risks and attack scenarios from both inside and outside adversaries. We then describe state-of-The-Art secure deduplication techniques for each approach that deal with different security issues under specific or combined threat models, which include both cryptographic and protocol solutions. We discuss and compare each scheme in terms of security and efficiency specific to different security goals. Finally, we identify and discuss unresolved issues and further research challenges for secure deduplication in cloud storage.

Original languageEnglish
Article number3017428
JournalACM Computing Surveys
Volume49
Issue number4
DOIs
Publication statusPublished - 2017 Jan 1

Fingerprint

Storage System
Privacy
Attack
Costs
Scenarios
Trade-offs
Model
Range of data

Keywords

  • Deterministic information dispersal
  • Message-dependent encryption
  • Proof of ownership
  • Traffic obfuscation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Survey of secure data deduplication schemes for cloud storage systems. / Shin, Youngjoo; Koo, Dongyoung; Hur, Junbeom.

In: ACM Computing Surveys, Vol. 49, No. 4, 3017428, 01.01.2017.

Research output: Contribution to journalArticle

@article{2be30db89aca4cd186de1b07b47f58c4,
title = "Survey of secure data deduplication schemes for cloud storage systems",
abstract = "Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly accepted, it comes with many security and privacy problems due to the outsourced data delivery models of cloud storage. To deal with specific security and privacy issues, secure deduplication techniques have been proposed for cloud data, leading to a diverse range of solutions and trade-offs. Hence, in this article, we discuss ongoing research on secure deduplication for cloud data in consideration of the attack scenarios exploited most widely in cloud storage. On the basis of classification of deduplication system, we explore security risks and attack scenarios from both inside and outside adversaries. We then describe state-of-The-Art secure deduplication techniques for each approach that deal with different security issues under specific or combined threat models, which include both cryptographic and protocol solutions. We discuss and compare each scheme in terms of security and efficiency specific to different security goals. Finally, we identify and discuss unresolved issues and further research challenges for secure deduplication in cloud storage.",
keywords = "Deterministic information dispersal, Message-dependent encryption, Proof of ownership, Traffic obfuscation",
author = "Youngjoo Shin and Dongyoung Koo and Junbeom Hur",
year = "2017",
month = "1",
day = "1",
doi = "10.1145/3017428",
language = "English",
volume = "49",
journal = "ACM Computing Surveys",
issn = "0360-0300",
publisher = "Association for Computing Machinery (ACM)",
number = "4",

}

TY - JOUR

T1 - Survey of secure data deduplication schemes for cloud storage systems

AU - Shin, Youngjoo

AU - Koo, Dongyoung

AU - Hur, Junbeom

PY - 2017/1/1

Y1 - 2017/1/1

N2 - Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly accepted, it comes with many security and privacy problems due to the outsourced data delivery models of cloud storage. To deal with specific security and privacy issues, secure deduplication techniques have been proposed for cloud data, leading to a diverse range of solutions and trade-offs. Hence, in this article, we discuss ongoing research on secure deduplication for cloud data in consideration of the attack scenarios exploited most widely in cloud storage. On the basis of classification of deduplication system, we explore security risks and attack scenarios from both inside and outside adversaries. We then describe state-of-The-Art secure deduplication techniques for each approach that deal with different security issues under specific or combined threat models, which include both cryptographic and protocol solutions. We discuss and compare each scheme in terms of security and efficiency specific to different security goals. Finally, we identify and discuss unresolved issues and further research challenges for secure deduplication in cloud storage.

AB - Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly accepted, it comes with many security and privacy problems due to the outsourced data delivery models of cloud storage. To deal with specific security and privacy issues, secure deduplication techniques have been proposed for cloud data, leading to a diverse range of solutions and trade-offs. Hence, in this article, we discuss ongoing research on secure deduplication for cloud data in consideration of the attack scenarios exploited most widely in cloud storage. On the basis of classification of deduplication system, we explore security risks and attack scenarios from both inside and outside adversaries. We then describe state-of-The-Art secure deduplication techniques for each approach that deal with different security issues under specific or combined threat models, which include both cryptographic and protocol solutions. We discuss and compare each scheme in terms of security and efficiency specific to different security goals. Finally, we identify and discuss unresolved issues and further research challenges for secure deduplication in cloud storage.

KW - Deterministic information dispersal

KW - Message-dependent encryption

KW - Proof of ownership

KW - Traffic obfuscation

UR - http://www.scopus.com/inward/record.url?scp=85011418894&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85011418894&partnerID=8YFLogxK

U2 - 10.1145/3017428

DO - 10.1145/3017428

M3 - Article

AN - SCOPUS:85011418894

VL - 49

JO - ACM Computing Surveys

JF - ACM Computing Surveys

SN - 0360-0300

IS - 4

M1 - 3017428

ER -