Abstract
Secure deduplication aims to efficiently eliminate redundant data in cloud storage system, where convergent encryption (CE) is widely-used to provide the data confidentiality. As the number of convergent keys (CKs) in CE will increase dramatically with enlarging data, there is a critical issue that how to safely manage the CKs. Previous works usually introduce a fully-trusted key management server (KS) to ensure the CKs security, resulting in data leakage by KS in reality. In this paper, we propose a blockchain-based secure deduplication scheme with reliable CK management, denoted as BDKM, which introduces different secret information to CE to enhance the data confidentiality in different level deduplications. To realize secure and reliable CK management, the CK will be divided into key segments by using secret sharing scheme and distributed on blockchain as transactions. Therefore, only the valid data owner can recover the CK from the blockchain and the original data will be protected even if the adversaries have colluded with cloud service provider. Security analysis and performance evaluation demonstrate that our proposed scheme can remain secure under the proposed security models with a limited overhead.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Dong M, Li H, Ota K et al (2014) HVSTO: efficient privacy preserving hybrid storage in cloud data center. In: International conference on computer communications
Chen X, Li J, Ma J et al (2012) New algorithms for secure outsourcing of modular exponentiations. In: European symposium on research in computer security
Zwolenski M, Weatherill L (2014) The digital universe: rich data and the increasing value of the internet of things. Aust J Telecommun Digit Econ 2(3):47
G. Drive (2017) http://drive.google.com/
Dropbox (2007) http://www.dropbox.com/
Mozy (2018) http://www.mozy.com/
Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur Priv 8(6):40–47
Borges EN, Carvalho MGD, Galante R et al (2011) An unsupervised heuristic-based approach for bibliographic metadata deduplication. Inf Process Manag 47(5):706–718
Li J, Chen X, Huang X et al (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579
Yuan J, Yu S (2013) Secure and constant cost public cloud storage auditing with deduplication. In: Communications and networking symposium, pp 145–153
Clements AT, Ahmad I, Vilayannur M et al (2009) Decentralized deduplication in SAN cluster file systems. In: USENIX annual technical conference, pp 8–8
Bellare M, Keelveedhi S, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. In: USENIX security symposium, pp 179–194
Miao M, Wang J, Li H et al (2015) Secure multi-server-aided data deduplication in cloud computing. Pervasive Mobile Comput 24:129–137
Bellare M, Keelveedhi S (2013) Interactive message-locked encryption and secure deduplication. Springer, Berlin
Fan Y, Lin X, Liang W et al (2019) A secure privacy preserving deduplication scheme for cloud computing. Future Gener Comput Syst 101:127–135
Li M, Qin C, Lee PPC (2015) CDStore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. In: Proceedings of the 2015 USENIX conference on usenix annual technical conference, pp 111–124
Puzio P, Molva R, Önen M (2015) PerfectDedup: secure data deduplication. In: International workshop on data privacy management. Springer, Atlanta, pp 150–166
Chen R, Yi M, Yang G et al (2015) BL-MLE: block-level message-locked encryption for secure large file deduplication. IEEE Trans Inf Forensics Secur 10(12):2643–2652
Bobbarjung DR, Jagannathan S, Dubnicki C (2006) Improving duplicate elimination in storage systems. ACM Trans Storage 2(4):424–448
Widodo RNS, Lim H, Atiquzzaman M (2017) A new content-defined chunking algorithm for data deduplication in cloud storage. Future Gener Comput Syst 71:145–156
Li J, Li YK, Chen X et al (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216
Douceur JR, Adya A, Bolosky WJ (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: International conference on distributed computing systems. Proceedings. IEEE, pp 617–624
Wang L, Wang B, Song W et al (2019) A key-sharing based secure deduplication scheme in cloud storage. Inf Sci 504:48–60
Puzio P, Molva R, Nen M et al (2013) ClouDedup: secure deduplication with encrypted data for cloud storage. In: Proceedings of the 2013 IEEE international conference on cloud computing technology and science, vol 01
Stanek J, Sorniotti A, Androulaki E et al (2014) A secure data deduplication scheme for cloud storage. In: International conference on financial cryptography and data security, pp 99–118
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques
Zhou Y, Feng D, Xia W et al (2015) SecDep: a user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In: IEEE conference on mass storage systems and technologies, pp 1–14
Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Future Gener Comput Sys 88:156–167
Li J, Chen X, Li M et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625
Kwon H, Hahn C, Koo D et al (2017) Scalable and reliable key management for secure deduplication in cloud storage. In: International conference on cloud computing, pp 391–398
Halevi S, Harnik D, Pinkas B et al (2011) Proofs of ownership in remote storage systems. In: Computer and communications security
Li L, Liu J, Chang X et al (2020) Toward conditionally anonymous bitcoin transactions: a lightweight-script approach. Inf Sci 509:290–303
Cao S, Zhang G, Liu P et al (2019) Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Inf Sci 485:427–440
Kabra N, Bhattacharya P, Tanwar S et al (2020) MudraChain: blockchain-based framework for automated cheque clearance in financial institutions. Future Gener Comput Syst 102:574–587
Au MH, Han J, Wu Q et al (2020) Special issue on cryptographic currency and blockchain technology. Future Gener Comput Syst 107:758–759
Naor M, Reingold O (2004) Number-theoretic constructions of efficient pseudo-random functions. J ACM 51(2):231–262
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No. 62076073), the Guangdong Basic and Applied Basic Research Foundation (No. 2020A1515010616), the Guangdong Innovative Research Team Program (No. 2014ZT05G157), the Key-Area Research and Development Program of Guangdong Province (2019B010136001), and the Science and Technology Planning Project of Guangdong Province LZC0023, the Faculty Research Fund (DB21A9) and the HKIBS Research Program Grant Application (HCRG-201-002, 702024) at Lingnan University, Hong Kong.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, G., Xie, H., Yang, Z. et al. BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management. Neural Process Lett 54, 2657–2674 (2022). https://doi.org/10.1007/s11063-021-10450-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11063-021-10450-9