Skip to main content

Secure and Efficient Proof of Ownership Scheme for Client-Side Deduplication in Cloud Environments

Author name : OSAMA MAHMOUD OUDA
Publication Date : 2021-12-31
Journal Name : International Journal of Advanced Computer Science and Applications

Abstract

Data deduplication is an effective mechanism that reduces the required storage space of cloud storage servers by avoiding storing several copies of the same data. In contrast with server-side deduplication, client-side deduplication can not only save storage space but also reduce network bandwidth. Client-side deduplication schemes, however, might suffer from serious security threats. For instance, an adversary can spoof the server and gain access to a file he/she does not possess by claiming that she/he owns it. In order to thwart such a threat, the concept of proof-of-ownership (PoW) has been introduced. The security of the existing PoW scheme cannot be assured without affecting the computational complexity of the client-side deduplication. This paper proposes a secure and efficient PoW scheme for client-side deduplication in cloud environments with minimal computational overhead. The proposed scheme utilizes convergent encryption to encrypt a sufficiently large block specified by the server to challenge the client that claims possession of the file requested to be uploaded. To ensure that the client owns the entire file contents, and hence resist collusion attacks, the server challenges the client by requesting him to split the file he asks to upload into fixed-sized blocks and then encrypting a randomly chosen block using a key formed from extracting one bit at a specified location in all other blocks. This ensures a significant reduction in the communication overhead between the server and client. Computational complexity analysis and experimental results demonstrate that the proposed PoW scheme outperforms state-of-the-art PoW techniques.

Keywords

Client-side deduplication; proof of ownership; convergent encryption; could storage services

Publication Link

https://thesai.org/Downloads/Volume12No12/Paper_111-Secure_and_Efficient_Proof_of_Ownership_Scheme.pdf

Block_researches_list_suggestions

Suggestions to read

HIDS-IoMT: A Deep Learning-Based Intelligent Intrusion Detection System for the Internet of Medical Things
Ahlem . Harchy Ep Berguiga
“Synthesis and Characterization study of SnO2/α-Fe2O3, In2O3/α-Fe2O3 and ZnO/α-Fe2O3 thin films and its application as transparent conducting electrode in silicon heterojunction solar cell”
Asma Arfaoui
Frequency and voltage dependent of electrical and dielectric properties of 14 nm Fully Depleted Silicon-On-Insulator (FD-SOI)
MOHAMMED OMAR MOHAMMEDAHMED IBRAHIM
Strengths Mindset as a Mediator in the Relationship Between Paradoxical Leadership and Nurses' Positive Attitudes Towards Artificial Intelligence: A Cross-Sectional Study
MOHAMED ELSAYED MOHAMED ZAKY
Contact