Secure distributed deduplication systems with improved reliability

Li, Jin, Chen, Xiaofeng, Huang, Xinyi, Tang, Shaohua, Xiang, Yang, Hassan, Mohammad Mehedi and Alelaiwi, Abdulhameed 2015, Secure distributed deduplication systems with improved reliability, IEEE transactions on computers, vol. 64, no. 12, pp. 3569-3578, doi: 10.1109/TC.2015.2401017.

Attached Files
Name Description MIMEType Size Downloads

Title Secure distributed deduplication systems with improved reliability
Author(s) Li, Jin
Chen, Xiaofeng
Huang, Xinyi
Tang, Shaohua
Xiang, YangORCID iD for Xiang, Yang
Hassan, Mohammad Mehedi
Alelaiwi, Abdulhameed
Journal name IEEE transactions on computers
Volume number 64
Issue number 12
Start page 3569
End page 3578
Total pages 10
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2015-12-01
ISSN 0018-9340
Keyword(s) Science & Technology
Computer Science, Hardware & Architecture
Engineering, Electrical & Electronic
Computer Science
distributed storage system
secret sharing
Summary Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable deduplication system. We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous deduplication systems. Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments.
Language eng
DOI 10.1109/TC.2015.2401017
Field of Research 0803 Computer Software
0805 Distributed Computing
1006 Computer Hardware
080403 Data Structures
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, IEEE
Persistent URL

Document type: Journal Article
Collections: School of Information Technology
2018 ERA Submission
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 50 times in TR Web of Science
Scopus Citation Count Cited 70 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 108 Abstract Views, 4 File Downloads  -  Detailed Statistics
Created: Thu, 17 Mar 2016, 13:23:16 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact