Cryptology ePrint Archive: Report 2016/696

Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing

Süleyman Kardaş and Mehmet Sabır Kiraz

Abstract: Existing cloud storage systems obtain the data in its plaintext form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on the client-side (or via an encryption-as-a-service module) before uploading it to the cloud storage. Conventional client-side encryption solutions unfortunately make the deduplication more challenging. Privacy-preserving public auditing schemes, on the other hand, is also crucial because the clients outsource their data to the cloud providers and then permanently deletes the data from their local storages. In this paper, we consider the problem of secure deduplication over encrypted data stored in the cloud while supporting a privacy-preserving public auditing mechanism.We show that existing solutions cannot support both goals simultaneously due to the conflict of their security and efficiency requirements. In this respect, we present an efficient and secure deduplication scheme that supports client-side encryption and privacy-preserving public auditing. We finally show that our scheme provides better security and efficiency with respect to the very recently proposed existing schemes.

Category / Keywords: Secure Client-Side Deduplication, Public auditing, Privacy, Cloud Storage

Date: received 12 Jul 2016, last revised 31 Mar 2017

Contact author: mehmet kiraz at tubitak gov tr

Available format(s): PDF | BibTeX Citation

Note: Uploading protocol has been modified by adding an additional step for sending a signature to TPA. For clarification, a high level description of the system has been added as a new subsection. Contributions, introduction, and related work have been re-organized. The security analysis has also slightly been modified.

Version: 20170331:181843 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]