{"title":"DeDOP:对加密数据进行跨服务器所有权的重复数据删除","authors":"Hardik Gajera, M. Das","doi":"10.1109/ISEA-ISAP49340.2020.234998","DOIUrl":null,"url":null,"abstract":"The data deduplication is a standard practice among cloud service providers. The deduplication process allows storage servers to utilize limited storage capacity efficiently. The deduplication process is challenging when the data are in encrypted form. There are various data deduplication schemes for encrypted data. However, they do not consider a cross-server ownership issue. In this paper, we present a data deduplication scheme, DeDOP, for encrypted data, which also solves cross-server ownership issues. The scheme can detect two almost the same file uploaded by two different users on different storage servers in the system. If the fraction of the data match in two files is more than a certain threshold, then we say files are almost the same. The scheme provides tag consistency, which allows the system to detect data faking attacks where an adversary tries to upload fake data under the different tags in the system.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"DeDOP: Deduplication with cross-server Ownership over encrypted data\",\"authors\":\"Hardik Gajera, M. Das\",\"doi\":\"10.1109/ISEA-ISAP49340.2020.234998\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The data deduplication is a standard practice among cloud service providers. The deduplication process allows storage servers to utilize limited storage capacity efficiently. The deduplication process is challenging when the data are in encrypted form. There are various data deduplication schemes for encrypted data. However, they do not consider a cross-server ownership issue. In this paper, we present a data deduplication scheme, DeDOP, for encrypted data, which also solves cross-server ownership issues. The scheme can detect two almost the same file uploaded by two different users on different storage servers in the system. If the fraction of the data match in two files is more than a certain threshold, then we say files are almost the same. The scheme provides tag consistency, which allows the system to detect data faking attacks where an adversary tries to upload fake data under the different tags in the system.\",\"PeriodicalId\":235855,\"journal\":{\"name\":\"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISEA-ISAP49340.2020.234998\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEA-ISAP49340.2020.234998","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DeDOP: Deduplication with cross-server Ownership over encrypted data
The data deduplication is a standard practice among cloud service providers. The deduplication process allows storage servers to utilize limited storage capacity efficiently. The deduplication process is challenging when the data are in encrypted form. There are various data deduplication schemes for encrypted data. However, they do not consider a cross-server ownership issue. In this paper, we present a data deduplication scheme, DeDOP, for encrypted data, which also solves cross-server ownership issues. The scheme can detect two almost the same file uploaded by two different users on different storage servers in the system. If the fraction of the data match in two files is more than a certain threshold, then we say files are almost the same. The scheme provides tag consistency, which allows the system to detect data faking attacks where an adversary tries to upload fake data under the different tags in the system.