Skip to main content

A Signature-Sharing Based Auditing Scheme with Data Deduplication in Cloud Storage

  • Conference paper
  • First Online:
  • 696 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 704))

Abstract

With the rapid development of cloud computing, more and more individuals and enterprises trend to store their massive data in the cloud to reduce the expenses of data maintenance and achieve more convenient access. As the cloud service provider is not fully trusted, the accidents involving software or hardware in cloud servers may cause damage of the users’ data, which might be covered by the cloud servers deliberately for its reputation. What’s worse, the cloud servers may also maliciously discard the rarely accessed data for saving storage space. Data auditing can timely detect and restrict the malicious behaviors of the cloud servers, therefore it can improve the quality of cloud service. Meanwhile there are a large amount of data storing in the cloud repeatedly, the data deduplication technique can make the cloud keep the only physical duplicate for the same data, therefore eliminate redundant data and achieve the efficient storage. To achieve auditing with data deduplication, the existing schemes need different users to sign the same data, which consume a large amount of computing resources of the users, especially it is difficult to be accomplished in the case of poor computation in client side’s portable devices. Based on the public verifiability and batch auditing of the POR, we propose a signature-sharing based scheme, for the same data, it only needs the first user to sign and share its signature with the after users for data auditing, this can effectively reduce the burden of the signature computation of the users, consequently achieves both data integrity and storage efficiency.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yuan, J., Yu, S.: Secure and constant cost public cloud storage auditing with deduplication. In: Communications and Networking Symposium, pp. 145–153 (2013)

    Google Scholar 

  2. Juels, A., Kaliski, B.S.: Proofs of retrievability for large files. In: Computer and Communications Security, pp. 584–597 (2007)

    Google Scholar 

  3. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  4. Ateniese, G., Pietro, R.D., Mancini, L.V., et al.: Proceedings of the 4th International Conference on Security and Privacy in Communication Network (SecureComn 2008), Istanbul, Turkey, 22–25 September 2008, vol. 9, pp. 1–10. ACM, New York (2008)

    Google Scholar 

  5. Shacham, H., Waters, B.: Compact proofs of retrievability. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 90–107 (2008)

    Google Scholar 

  6. Wang, Q., Wang, C., Li, J., et al.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Symposium on Research in Computer Security, pp. 355–370 (2009)

    Google Scholar 

  7. Wang, C., Ren, K., Lou, W., et al.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)

    Article  Google Scholar 

  8. Erway, C.C., Kupcu, A., Papamanthou, C., et al.: Dynamic provable data possession. In: Computer and Communications Security, pp. 213–222 (2009)

    Google Scholar 

  9. Zhu, Y., Wang, H., Hu, Z., et al.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: ACM Symposium on Applied Computing, pp. 1550–1557 (2011)

    Google Scholar 

  10. Shuang, T., Lin, T., Xiaoling, L., et al.: An efficient method for checking the integrity of data in the cloud. China Commun. 11(9), 68–81 (2014)

    Article  Google Scholar 

  11. Jin, H., Jiang, H., Zhou, K., et al.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 1 (2016)

    Google Scholar 

  12. Meister, D., Brinkmann, A.: Multilevel comparison of data deduplication in a backup scenario. In: Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference 2009, Haifa, Israel, p. 8, 4–6 May 2009

    Google Scholar 

  13. Aronovich, L., Asher, R., Bachmat, E., Bitner, H., Hirsch, M., Klein, S.T.: The design of a similarity based deduplication system. In: Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, Haifa, Israel, 4–6 May 2009, p. 6 (2009)

    Google Scholar 

  14. Mandagere, N., Zhou, P., Smith, M.A., Uttamchandani, S.: Demystifying data deduplication. In: ACM/IFIP/USENIX 9th International Middleware Conference, Middleware 2008, Companion Proceedings, Leuven, Belgium, 1–5 December 2008, pp. 12–17 (2008)

    Google Scholar 

  15. Douceur, J.R., Adya, A., Bolosky, W.J., et al.: Reclaiming space from duplicate files in a serverless distributed file system. In: International Conference on Distributed Computing Systems, pp. 617–624 (2002)

    Google Scholar 

  16. Storer, M.W., Greenan, K.M., Long, D.D.E., Miller, E.L.: Secure data deduplication. In: Proceedings of the 2008 ACM Workshop on Storage Security and Survivability, StorageSS 2008, Alexandria, VA, USA, 31 October 2008, pp. 1–10 (2008)

    Google Scholar 

  17. Bellare, M., Keelveedhi, S., Ristenpart, T., et al.: Message-locked encryption and secure deduplication. In: Theory and Application of Cryptographic Techniques, pp. 296–312 (2013)

    Google Scholar 

  18. Bellare, M., Keelveedhi, S.: Interactive message-locked encryption and secure deduplication. In: Public Key Cryptography, pp. 516–538 (2015)

    Google Scholar 

  19. Li, J., Chen, X., Li, M., et al.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014)

    Article  Google Scholar 

  20. Meye, P., Raipin, P., Tronel, F., et al.: A secure two-phase data deduplication scheme. In: High Performance Computing and Communications, pp. 802–809 (2014)

    Google Scholar 

  21. Stanek, J., Kencl, L.: Enhanced secure thresholded data deduplication scheme for cloud storage. IEEE Trans. Dependable Secure Comput. 1 (2016)

    Google Scholar 

  22. Li, J., Li, J., Xie, D., et al.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  23. Alkhojandi, N., Miri, A.: Privacy-preserving public auditing in cloud computing with data deduplication. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P.W.L. (eds.) FPS 2014. LNCS, vol. 8930, pp. 35–48. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-17040-4_3

    Google Scholar 

  24. Yuan, J., Yu, S.: Secure and constant cost public cloud storage auditing with deduplication. In: Communications and Network Security, pp. 145–153. IEEE (2013)

    Google Scholar 

  25. Kai, H.E., Huang, C., Zhou, H., et al.: Public auditing for encrypted data with client-side deduplication in cloud storage. Wuhan Univ. J. Nat. Sci. 20(4), 291–298 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grants No. 61572390, the National Key Research and Development Program of China under Grants No. 2017YFB0802002, the National Natural Science Foundation of Ningbo City under Grants No. 201601HJ-B01382, and the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education (Guilin University of Electronic Technology) under Grants No. CRKL160202.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baocang Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, L., Wang, B., Ma, S. (2017). A Signature-Sharing Based Auditing Scheme with Data Deduplication in Cloud Storage. In: Xu, M., Qin, Z., Yan, F., Fu, S. (eds) Trusted Computing and Information Security. CTCIS 2017. Communications in Computer and Information Science, vol 704. Springer, Singapore. https://doi.org/10.1007/978-981-10-7080-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7080-8_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7079-2

  • Online ISBN: 978-981-10-7080-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics