Secure proof of storage with deduplication for cloud storage systems

Youngjoo Shin, Dongyoung Koo, Junbeom Hur, Joobeom Yun

Research output: Contribution to journalArticlepeer-review

9 Citations (Scopus)


Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a promising solution that addresses the issue for the cloud storage systems with deduplication enabled. However, the validity of the current POSD scheme stands on the strong assumption that all clients are honest in terms of generating their keys. We present insecurity of this approach under new attack model that malicious clients exploit dishonestly manipulated keys. We also propose an improved POSD scheme to mitigate our attack.

Original languageEnglish
Pages (from-to)19363-19378
Number of pages16
JournalMultimedia Tools and Applications
Issue number19
Publication statusPublished - 2017 Oct 1

Bibliographical note

Funding Information:
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2013R1A2A2A01005559, No.2015R1C1A1A02036511)

Publisher Copyright:
© 2015, Springer Science+Business Media New York.


  • Cloud computing
  • Cloud storage
  • Data deduplication
  • Multimedia content security
  • Proof of data possession
  • Proof of ownership
  • Proof of retrievability

ASJC Scopus subject areas

  • Software
  • Media Technology
  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'Secure proof of storage with deduplication for cloud storage systems'. Together they form a unique fingerprint.

Cite this