Secure and efficient data deduplication techniques for cloud storage systems클라우드 스토리지 시스템에서 안전하고 효율적인 데이터 중복 제거 기법에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 569
  • Download : 0
Data outsourcing to a cloud storage brings forth new challenges for efficient utilization of computing resources such as storage space and network bandwidth in the cloud computing infrastructure. Data deduplication refers to a technique that eliminates the redundant data on the storage and transmitting on the network, and is considered to be one of the the most-enabling storage technologies that offers efficient resource utilization in the cloud computing. However, applying data deduplication incurs security vulnerabilities in the cloud storage system so that untrusted entities including a cloud server or unauthorized users may break data confidentiality, privacy and integrity on the outsourced data. It is challenging to solve the problems of data security and privacy with respect to data deduplication, but certainly necessary for offering a mature and stable cloud storage service. In the dissertation, we study the security implications of data deduplication in the cloud computing environment. We analyze the issues of security and efficiency in various aspects, and propose novel solutions for secure and efficient data deduplication in the cloud storage system. First, we propose a secure and efficient file deduplication scheme that keeps data confidentiality from a cloud server and unauthorized users. For implementing the deduplication scheme, we construct two symmetric-key equality predicate encryption algorithms, which are cryptographic primitives in the symmetric-key setting that allow to know only equivalence relations among ciphertexts without leaking any other information about that plaintexts. By applying the constructions, the cloud server is able to perform deduplication over encrypted files without any knowledge of their content. This offers data confidentiality against the cloud server while still preserving the desired storage efficiency. In addition, the proposed deduplication scheme adopts randomized approach in hybrid manner. That is, deduplic...
Advisors
Kim, Kwang-Joresearcher김광조
Description
한국과학기술원 : 전산학과,
Publisher
한국과학기술원
Issue Date
2014
Identifier
591845/325007  / 020115153
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 전산학과, 2014.8, [ vii, 86 p. ]

Keywords

Predicate Encryption; 스토리지 무결성 증명; 차분적 프라이버시; 안전한 아웃소싱; 클라우드 컴퓨팅; 술어 암호; Cloud Computing; Secure Outsourcing; Differential Privacy; Proof of Storage

URI
http://hdl.handle.net/10203/197836
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=591845&flag=dissertation
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0