Abstract
This paper proposes a conceptually simple but practical management of outsourced data for provably secure duplicate elimination with efficient storage utilization. We focus on cutting off dependency of encryption key on underlying plain data, making data owners relieved from information leakage as long as their keys are kept secret. Rather than forcing data owners for the same content to share the same key, we restrict storage space in which duplicate identification and elimination occur in order to increase (de)duplication ratio. This allows data owners to choose their own keys with no restriction, and eventually the security of the proposed approach would not be affected by other data owners as well as inside and/or outside adversaries. Our approach can be adaptively applied to existing remote storage systems according to storage capacity and security requirements.
Original language | English |
---|---|
Title of host publication | 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN (Electronic) | 9781509051403 |
DOIs | |
Publication status | Published - 2017 Mar 20 |
Event | 4th International Conference on Platform Technology and Service, PlatCon 2017 - Busan, Korea, Republic of Duration: 2017 Feb 13 → 2017 Feb 15 |
Publication series
Name | 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings |
---|
Other
Other | 4th International Conference on Platform Technology and Service, PlatCon 2017 |
---|---|
Country/Territory | Korea, Republic of |
City | Busan |
Period | 17/2/13 → 17/2/15 |
Bibliographical note
Funding Information:This work was supported by a Korea University Grant. This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2016R1A2A2A05005402).
Publisher Copyright:
© 2017 IEEE.
Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
ASJC Scopus subject areas
- Computer Networks and Communications
- Computer Science Applications
- Hardware and Architecture
- Education