Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage

Dongyoung Koo, Youngjoo Shin, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes a conceptually simple but practical management of outsourced data for provably secure duplicate elimination with efficient storage utilization. We focus on cutting off dependency of encryption key on underlying plain data, making data owners relieved from information leakage as long as their keys are kept secret. Rather than forcing data owners for the same content to share the same key, we restrict storage space in which duplicate identification and elimination occur in order to increase (de)duplication ratio. This allows data owners to choose their own keys with no restriction, and eventually the security of the proposed approach would not be affected by other data owners as well as inside and/or outside adversaries. Our approach can be adaptively applied to existing remote storage systems according to storage capacity and security requirements.

Original languageEnglish
Title of host publication2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509051403
DOIs
Publication statusPublished - 2017 Mar 20
Event4th International Conference on Platform Technology and Service, PlatCon 2017 - Busan, Korea, Republic of
Duration: 2017 Feb 132017 Feb 15

Publication series

Name2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings

Other

Other4th International Conference on Platform Technology and Service, PlatCon 2017
Country/TerritoryKorea, Republic of
CityBusan
Period17/2/1317/2/15

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Education

Fingerprint

Dive into the research topics of 'Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage'. Together they form a unique fingerprint.

Cite this