TY - GEN
T1 - Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage
AU - Koo, Dongyoung
AU - Shin, Youngjoo
AU - Hur, Junbeom
N1 - Funding Information:
This work was supported by a Korea University Grant. This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2016R1A2A2A05005402).
Publisher Copyright:
© 2017 IEEE.
Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
PY - 2017/3/20
Y1 - 2017/3/20
N2 - This paper proposes a conceptually simple but practical management of outsourced data for provably secure duplicate elimination with efficient storage utilization. We focus on cutting off dependency of encryption key on underlying plain data, making data owners relieved from information leakage as long as their keys are kept secret. Rather than forcing data owners for the same content to share the same key, we restrict storage space in which duplicate identification and elimination occur in order to increase (de)duplication ratio. This allows data owners to choose their own keys with no restriction, and eventually the security of the proposed approach would not be affected by other data owners as well as inside and/or outside adversaries. Our approach can be adaptively applied to existing remote storage systems according to storage capacity and security requirements.
AB - This paper proposes a conceptually simple but practical management of outsourced data for provably secure duplicate elimination with efficient storage utilization. We focus on cutting off dependency of encryption key on underlying plain data, making data owners relieved from information leakage as long as their keys are kept secret. Rather than forcing data owners for the same content to share the same key, we restrict storage space in which duplicate identification and elimination occur in order to increase (de)duplication ratio. This allows data owners to choose their own keys with no restriction, and eventually the security of the proposed approach would not be affected by other data owners as well as inside and/or outside adversaries. Our approach can be adaptively applied to existing remote storage systems according to storage capacity and security requirements.
UR - http://www.scopus.com/inward/record.url?scp=85018170952&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85018170952&partnerID=8YFLogxK
U2 - 10.1109/PlatCon.2017.7883720
DO - 10.1109/PlatCon.2017.7883720
M3 - Conference contribution
AN - SCOPUS:85018170952
T3 - 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings
BT - 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Platform Technology and Service, PlatCon 2017
Y2 - 13 February 2017 through 15 February 2017
ER -