A secure hierarchical deduplication system in cloud storage

Xin Yao, Yaping Lin, Qin Liu, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Data deduplication is commonly adopted in cloud storage services to improve storage utilization and reduce transmission bandwidth. It, however, conflicts with the requirement for data confidentiality offered by data encryption. Hierarchical authorized deduplication alleviates the tension between data deduplication and confidentiality and allows a cloud user to perform privilege-based duplicate checks before uploading the data. Existing hierarchical authorized deduplication systems permit the cloud server to profile cloud users according to their privileges. In this paper, we propose a secure hierarchical deduplication system to support privilege-based duplicate checks and also prevent privilege-based user profiling by the cloud server. Our system also supports dynamic privilege changes. Detailed theoretical analysis and experimental studies confirm the security and high efficiency of our system.

Original languageEnglish (US)
Title of host publication2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509026340
DOIs
StatePublished - Oct 13 2016
Event24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016 - Beijing, China
Duration: Jun 20 2016Jun 21 2016

Publication series

Name2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016

Other

Other24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016
Country/TerritoryChina
CityBeijing
Period6/20/166/21/16

ASJC Scopus subject areas

  • Management of Technology and Innovation
  • Computer Networks and Communications
  • Media Technology
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'A secure hierarchical deduplication system in cloud storage'. Together they form a unique fingerprint.

Cite this