TY - GEN
T1 - A secure hierarchical deduplication system in cloud storage
AU - Yao, Xin
AU - Lin, Yaping
AU - Liu, Qin
AU - Zhang, Yanchao
N1 - Funding Information:
The authors would like to thank Ming Li of [22] for sharing their code for HPE. This work was supported in part by the National Natural Science Foundation of China (Grant No. 61472125, 61402161)
Publisher Copyright:
© 2016 IEEE.
PY - 2016/10/13
Y1 - 2016/10/13
N2 - Data deduplication is commonly adopted in cloud storage services to improve storage utilization and reduce transmission bandwidth. It, however, conflicts with the requirement for data confidentiality offered by data encryption. Hierarchical authorized deduplication alleviates the tension between data deduplication and confidentiality and allows a cloud user to perform privilege-based duplicate checks before uploading the data. Existing hierarchical authorized deduplication systems permit the cloud server to profile cloud users according to their privileges. In this paper, we propose a secure hierarchical deduplication system to support privilege-based duplicate checks and also prevent privilege-based user profiling by the cloud server. Our system also supports dynamic privilege changes. Detailed theoretical analysis and experimental studies confirm the security and high efficiency of our system.
AB - Data deduplication is commonly adopted in cloud storage services to improve storage utilization and reduce transmission bandwidth. It, however, conflicts with the requirement for data confidentiality offered by data encryption. Hierarchical authorized deduplication alleviates the tension between data deduplication and confidentiality and allows a cloud user to perform privilege-based duplicate checks before uploading the data. Existing hierarchical authorized deduplication systems permit the cloud server to profile cloud users according to their privileges. In this paper, we propose a secure hierarchical deduplication system to support privilege-based duplicate checks and also prevent privilege-based user profiling by the cloud server. Our system also supports dynamic privilege changes. Detailed theoretical analysis and experimental studies confirm the security and high efficiency of our system.
UR - http://www.scopus.com/inward/record.url?scp=85009820731&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85009820731&partnerID=8YFLogxK
U2 - 10.1109/IWQoS.2016.7590397
DO - 10.1109/IWQoS.2016.7590397
M3 - Conference contribution
AN - SCOPUS:85009820731
T3 - 2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016
BT - 2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016
Y2 - 20 June 2016 through 21 June 2016
ER -