Abstract
With the rapid development of cloud computing, more and more individuals and enterprises trend to store their massive data in the cloud to reduce the expenses of data maintenance and achieve more convenient access. As the cloud service provider is not fully trusted, the accidents involving software or hardware in cloud servers may cause damage of the users’ data, which might be covered by the cloud servers deliberately for its reputation. What’s worse, the cloud servers may also maliciously discard the rarely accessed data for saving storage space. Data auditing can timely detect and restrict the malicious behaviors of the cloud servers, therefore it can improve the quality of cloud service. Meanwhile there are a large amount of data storing in the cloud repeatedly, the data deduplication technique can make the cloud keep the only physical duplicate for the same data, therefore eliminate redundant data and achieve the efficient storage. To achieve auditing with data deduplication, the existing schemes need different users to sign the same data, which consume a large amount of computing resources of the users, especially it is difficult to be accomplished in the case of poor computation in client side’s portable devices. Based on the public verifiability and batch auditing of the POR, we propose a signature-sharing based scheme, for the same data, it only needs the first user to sign and share its signature with the after users for data auditing, this can effectively reduce the burden of the signature computation of the users, consequently achieves both data integrity and storage efficiency.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Yuan, J., Yu, S.: Secure and constant cost public cloud storage auditing with deduplication. In: Communications and Networking Symposium, pp. 145–153 (2013)
Juels, A., Kaliski, B.S.: Proofs of retrievability for large files. In: Computer and Communications Security, pp. 584–597 (2007)
Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Computer and Communications Security, pp. 598–609 (2007)
Ateniese, G., Pietro, R.D., Mancini, L.V., et al.: Proceedings of the 4th International Conference on Security and Privacy in Communication Network (SecureComn 2008), Istanbul, Turkey, 22–25 September 2008, vol. 9, pp. 1–10. ACM, New York (2008)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 90–107 (2008)
Wang, Q., Wang, C., Li, J., et al.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Symposium on Research in Computer Security, pp. 355–370 (2009)
Wang, C., Ren, K., Lou, W., et al.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)
Erway, C.C., Kupcu, A., Papamanthou, C., et al.: Dynamic provable data possession. In: Computer and Communications Security, pp. 213–222 (2009)
Zhu, Y., Wang, H., Hu, Z., et al.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: ACM Symposium on Applied Computing, pp. 1550–1557 (2011)
Shuang, T., Lin, T., Xiaoling, L., et al.: An efficient method for checking the integrity of data in the cloud. China Commun. 11(9), 68–81 (2014)
Jin, H., Jiang, H., Zhou, K., et al.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 1 (2016)
Meister, D., Brinkmann, A.: Multilevel comparison of data deduplication in a backup scenario. In: Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference 2009, Haifa, Israel, p. 8, 4–6 May 2009
Aronovich, L., Asher, R., Bachmat, E., Bitner, H., Hirsch, M., Klein, S.T.: The design of a similarity based deduplication system. In: Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, Haifa, Israel, 4–6 May 2009, p. 6 (2009)
Mandagere, N., Zhou, P., Smith, M.A., Uttamchandani, S.: Demystifying data deduplication. In: ACM/IFIP/USENIX 9th International Middleware Conference, Middleware 2008, Companion Proceedings, Leuven, Belgium, 1–5 December 2008, pp. 12–17 (2008)
Douceur, J.R., Adya, A., Bolosky, W.J., et al.: Reclaiming space from duplicate files in a serverless distributed file system. In: International Conference on Distributed Computing Systems, pp. 617–624 (2002)
Storer, M.W., Greenan, K.M., Long, D.D.E., Miller, E.L.: Secure data deduplication. In: Proceedings of the 2008 ACM Workshop on Storage Security and Survivability, StorageSS 2008, Alexandria, VA, USA, 31 October 2008, pp. 1–10 (2008)
Bellare, M., Keelveedhi, S., Ristenpart, T., et al.: Message-locked encryption and secure deduplication. In: Theory and Application of Cryptographic Techniques, pp. 296–312 (2013)
Bellare, M., Keelveedhi, S.: Interactive message-locked encryption and secure deduplication. In: Public Key Cryptography, pp. 516–538 (2015)
Li, J., Chen, X., Li, M., et al.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014)
Meye, P., Raipin, P., Tronel, F., et al.: A secure two-phase data deduplication scheme. In: High Performance Computing and Communications, pp. 802–809 (2014)
Stanek, J., Kencl, L.: Enhanced secure thresholded data deduplication scheme for cloud storage. IEEE Trans. Dependable Secure Comput. 1 (2016)
Li, J., Li, J., Xie, D., et al.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2016)
Alkhojandi, N., Miri, A.: Privacy-preserving public auditing in cloud computing with data deduplication. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P.W.L. (eds.) FPS 2014. LNCS, vol. 8930, pp. 35–48. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-17040-4_3
Yuan, J., Yu, S.: Secure and constant cost public cloud storage auditing with deduplication. In: Communications and Network Security, pp. 145–153. IEEE (2013)
Kai, H.E., Huang, C., Zhou, H., et al.: Public auditing for encrypted data with client-side deduplication in cloud storage. Wuhan Univ. J. Nat. Sci. 20(4), 291–298 (2015)
Acknowledgments
This work was supported by the National Natural Science Foundation of China under Grants No. 61572390, the National Key Research and Development Program of China under Grants No. 2017YFB0802002, the National Natural Science Foundation of Ningbo City under Grants No. 201601HJ-B01382, and the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education (Guilin University of Electronic Technology) under Grants No. CRKL160202.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, L., Wang, B., Ma, S. (2017). A Signature-Sharing Based Auditing Scheme with Data Deduplication in Cloud Storage. In: Xu, M., Qin, Z., Yan, F., Fu, S. (eds) Trusted Computing and Information Security. CTCIS 2017. Communications in Computer and Information Science, vol 704. Springer, Singapore. https://doi.org/10.1007/978-981-10-7080-8_3
Download citation
DOI: https://doi.org/10.1007/978-981-10-7080-8_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7079-2
Online ISBN: 978-981-10-7080-8
eBook Packages: Computer ScienceComputer Science (R0)