Secure Cloud Storage with Joint Deduplication and Erasure Protection
(2022) 2022 IEEE 15th International Conference on Cloud Computing (CLOUD) p.554-563- Abstract
- This work proposes a novel design for secure cloud storage systems using a third party to meet three seemingly opposing demands: reduce storage requirements on the cloud, protect against erasures (data loss), and maintain confidentiality of the data. More specifically, we achieve storage cost reductions using data deduplication without requiring system users to trust that the cloud operates honestly. We analyze the security of our scheme against honest-but-curious and covert adversaries that may collude with multiple parties and show that no novel sensitive information can be inferred, assuming random oracles and a high min-entropy data source. We also provide a mathematical analysis to characterize its potential for compression given the... (More)
- This work proposes a novel design for secure cloud storage systems using a third party to meet three seemingly opposing demands: reduce storage requirements on the cloud, protect against erasures (data loss), and maintain confidentiality of the data. More specifically, we achieve storage cost reductions using data deduplication without requiring system users to trust that the cloud operates honestly. We analyze the security of our scheme against honest-but-curious and covert adversaries that may collude with multiple parties and show that no novel sensitive information can be inferred, assuming random oracles and a high min-entropy data source. We also provide a mathematical analysis to characterize its potential for compression given the popularity of individual chunks of data and its overall erasure protection capabilities. In fact, we show that the storage cost of our scheme for a chunk with r replicas is O(log(r)/r), while deduplication without security or reliability considerations is O(1/r), i.e., our added cost for providing reliability and security is only O(log(r)). We provide a proof of concept implementation to simulate performance and verify our analytical results. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/3027b2ef-90eb-4464-afd6-98ecdc13d92e
- author
- Vestergaard, Rasmus
; Pagnin, Elena
LU
; Kundu, Rohon LU and Lucani, Daniel E.
- organization
- publishing date
- 2022-08-22
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- 2022 IEEE 15th International Conference on Cloud Computing (IEEE CLOUD 2022)
- pages
- 554 - 563
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 2022 IEEE 15th International Conference on Cloud Computing (CLOUD)
- conference location
- Barcelona, Spain
- conference dates
- 2022-07-11 - 2022-07-15
- external identifiers
-
- scopus:85137561474
- ISBN
- 978-1-6654-8138-0
- 978-1-6654-8137-3
- DOI
- 10.1109/CLOUD55607.2022.00078
- project
- Säkra mjukvaruuppdateringar för den smarta staden
- language
- English
- LU publication?
- yes
- id
- 3027b2ef-90eb-4464-afd6-98ecdc13d92e
- date added to LUP
- 2022-08-31 12:02:08
- date last changed
- 2024-06-02 00:44:55
@inproceedings{3027b2ef-90eb-4464-afd6-98ecdc13d92e, abstract = {{This work proposes a novel design for secure cloud storage systems using a third party to meet three seemingly opposing demands: reduce storage requirements on the cloud, protect against erasures (data loss), and maintain confidentiality of the data. More specifically, we achieve storage cost reductions using data deduplication without requiring system users to trust that the cloud operates honestly. We analyze the security of our scheme against honest-but-curious and covert adversaries that may collude with multiple parties and show that no novel sensitive information can be inferred, assuming random oracles and a high min-entropy data source. We also provide a mathematical analysis to characterize its potential for compression given the popularity of individual chunks of data and its overall erasure protection capabilities. In fact, we show that the storage cost of our scheme for a chunk with r replicas is O(log(r)/r), while deduplication without security or reliability considerations is O(1/r), i.e., our added cost for providing reliability and security is only O(log(r)). We provide a proof of concept implementation to simulate performance and verify our analytical results.}}, author = {{Vestergaard, Rasmus and Pagnin, Elena and Kundu, Rohon and Lucani, Daniel E.}}, booktitle = {{2022 IEEE 15th International Conference on Cloud Computing (IEEE CLOUD 2022)}}, isbn = {{978-1-6654-8138-0}}, language = {{eng}}, month = {{08}}, pages = {{554--563}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{Secure Cloud Storage with Joint Deduplication and Erasure Protection}}, url = {{http://dx.doi.org/10.1109/CLOUD55607.2022.00078}}, doi = {{10.1109/CLOUD55607.2022.00078}}, year = {{2022}}, }