{"title":"Blind and bidirectional ownership verification for deduplicated cloud computing systems","authors":"Jay Dave, Kamalesh Ram R, Pratik Patil, Himanshu Patil, Sarvesh Borole, Chinni Vamshi Krushna, Suyash Patil","doi":"10.1016/j.future.2025.108082","DOIUrl":null,"url":null,"abstract":"<div><div>Cloud storage systems provide several benefits, such as scalable storage capacity, cost efficiency with pay-as-you-go pricing models, easy access from any location with an internet connection, and robust data backup options. These advantages drive the growing popularity of cloud storage, resulting in a rapid increase in the volume of data stored on the cloud. Deduplication is an effective data management technique used in these systems to reduce storage costs and enhance efficiency through the elimination of redundant data. However, in a deduplication system, a hash digest, i.e., a small piece of information, is used as ownership proof of the entire file. Therefore, a malicious user can gain access to a sensitive file already stored on the cloud by obtaining and presenting the hash digest of that file. On the other hand, data stored in the cloud may be susceptible to loss or damage due to various accidental or intentional reasons. Hence, there is a need for an ownership verification protocol where both the user and server can verify each other’s file ownership without revealing details about the file. Some existing state-of-the-art schemes consider the server as a trusted entity and focus solely on verifying the ownership of the user, while others emphasize bidirectional ownership verification but do not incorporate obliviousness in their solutions. In this paper, we propose a novel bidirectional and oblivious ownership verification scheme for deduplication systems. We cryptographically prove that adversaries lacking complete ownership of the file, cannot successfully pass ownership verification with non-negligible probability. Additionally, we show that adversaries cannot gain any knowledge about the file through the ownership verification process. We implement our scheme in two real cloud scenarios and analyze performance compared to the recent state-of-the-art schemes. The experimental results demonstrate that our approach incurs moderate computational, communication, storage, and energy overheads while achieving ownership authentication and maintaining obliviousness in deduplicated cloud storage systems.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"175 ","pages":"Article 108082"},"PeriodicalIF":6.2000,"publicationDate":"2025-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Computer Systems-The International Journal of Escience","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167739X25003760","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud storage systems provide several benefits, such as scalable storage capacity, cost efficiency with pay-as-you-go pricing models, easy access from any location with an internet connection, and robust data backup options. These advantages drive the growing popularity of cloud storage, resulting in a rapid increase in the volume of data stored on the cloud. Deduplication is an effective data management technique used in these systems to reduce storage costs and enhance efficiency through the elimination of redundant data. However, in a deduplication system, a hash digest, i.e., a small piece of information, is used as ownership proof of the entire file. Therefore, a malicious user can gain access to a sensitive file already stored on the cloud by obtaining and presenting the hash digest of that file. On the other hand, data stored in the cloud may be susceptible to loss or damage due to various accidental or intentional reasons. Hence, there is a need for an ownership verification protocol where both the user and server can verify each other’s file ownership without revealing details about the file. Some existing state-of-the-art schemes consider the server as a trusted entity and focus solely on verifying the ownership of the user, while others emphasize bidirectional ownership verification but do not incorporate obliviousness in their solutions. In this paper, we propose a novel bidirectional and oblivious ownership verification scheme for deduplication systems. We cryptographically prove that adversaries lacking complete ownership of the file, cannot successfully pass ownership verification with non-negligible probability. Additionally, we show that adversaries cannot gain any knowledge about the file through the ownership verification process. We implement our scheme in two real cloud scenarios and analyze performance compared to the recent state-of-the-art schemes. The experimental results demonstrate that our approach incurs moderate computational, communication, storage, and energy overheads while achieving ownership authentication and maintaining obliviousness in deduplicated cloud storage systems.
期刊介绍:
Computing infrastructures and systems are constantly evolving, resulting in increasingly complex and collaborative scientific applications. To cope with these advancements, there is a growing need for collaborative tools that can effectively map, control, and execute these applications.
Furthermore, with the explosion of Big Data, there is a requirement for innovative methods and infrastructures to collect, analyze, and derive meaningful insights from the vast amount of data generated. This necessitates the integration of computational and storage capabilities, databases, sensors, and human collaboration.
Future Generation Computer Systems aims to pioneer advancements in distributed systems, collaborative environments, high-performance computing, and Big Data analytics. It strives to stay at the forefront of developments in grids, clouds, and the Internet of Things (IoT) to effectively address the challenges posed by these wide-area, fully distributed sensing and computing systems.