Secure and efficient data deduplication techniques for cloud storage systems클라우드 스토리지 시스템에서 안전하고 효율적인 데이터 중복 제거 기법에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 599
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorShin, Young-Joo-
dc.contributor.author신영주-
dc.date.accessioned2015-04-23T08:30:43Z-
dc.date.available2015-04-23T08:30:43Z-
dc.date.issued2014-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=591845&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/197836-
dc.description학위논문(박사) - 한국과학기술원 : 전산학과, 2014.8, [ vii, 86 p. ]-
dc.description.abstractData outsourcing to a cloud storage brings forth new challenges for efficient utilization of computing resources such as storage space and network bandwidth in the cloud computing infrastructure. Data deduplication refers to a technique that eliminates the redundant data on the storage and transmitting on the network, and is considered to be one of the the most-enabling storage technologies that offers efficient resource utilization in the cloud computing. However, applying data deduplication incurs security vulnerabilities in the cloud storage system so that untrusted entities including a cloud server or unauthorized users may break data confidentiality, privacy and integrity on the outsourced data. It is challenging to solve the problems of data security and privacy with respect to data deduplication, but certainly necessary for offering a mature and stable cloud storage service. In the dissertation, we study the security implications of data deduplication in the cloud computing environment. We analyze the issues of security and efficiency in various aspects, and propose novel solutions for secure and efficient data deduplication in the cloud storage system. First, we propose a secure and efficient file deduplication scheme that keeps data confidentiality from a cloud server and unauthorized users. For implementing the deduplication scheme, we construct two symmetric-key equality predicate encryption algorithms, which are cryptographic primitives in the symmetric-key setting that allow to know only equivalence relations among ciphertexts without leaking any other information about that plaintexts. By applying the constructions, the cloud server is able to perform deduplication over encrypted files without any knowledge of their content. This offers data confidentiality against the cloud server while still preserving the desired storage efficiency. In addition, the proposed deduplication scheme adopts randomized approach in hybrid manner. That is, deduplic...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectPredicate Encryption-
dc.subject스토리지 무결성 증명-
dc.subject차분적 프라이버시-
dc.subject안전한 아웃소싱-
dc.subject클라우드 컴퓨팅-
dc.subject술어 암호-
dc.subjectCloud Computing-
dc.subjectSecure Outsourcing-
dc.subjectDifferential Privacy-
dc.subjectProof of Storage-
dc.titleSecure and efficient data deduplication techniques for cloud storage systems-
dc.title.alternative클라우드 스토리지 시스템에서 안전하고 효율적인 데이터 중복 제거 기법에 관한 연구-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN591845/325007 -
dc.description.department한국과학기술원 : 전산학과, -
dc.identifier.uid020115153-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0