TY - GEN
T1 - A tunable proof of ownership scheme for deduplication using Bloom filters
AU - Blasco, Jorge
AU - Di Pietro, Roberto
AU - Orfila, Agustin
AU - Sorniotti, Alessandro
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2014/12/23
Y1 - 2014/12/23
N2 - Deduplication is a widely used technique in storage services, since it affords a very efficient usage of resources-being especially effective for consumer-grade storage services (e.g. Dropbox). Deduplication has been shown to suffer from several security weaknesses, the most severe ones enabling a malicious user to obtain possession of a file it is not entitled to. Standard solutions to this problem require users to prove possession of data prior to its upload. Unfortunately, the schemes proposed in the literature are very taxing on either the server or the client side. In this paper, we introduce a novel solution based on Bloom filters that provides a flexible, scalable, and provably secure solution to the weaknesses of deduplication, and that overcomes the deficiencies of existing approaches. We provide a formal description of the scheme, a thorough security analysis, and compare our solution against multiple existing ones, both analytically and by means of extensive benchmarking. Our results confirm the quality and viability of our approach.
AB - Deduplication is a widely used technique in storage services, since it affords a very efficient usage of resources-being especially effective for consumer-grade storage services (e.g. Dropbox). Deduplication has been shown to suffer from several security weaknesses, the most severe ones enabling a malicious user to obtain possession of a file it is not entitled to. Standard solutions to this problem require users to prove possession of data prior to its upload. Unfortunately, the schemes proposed in the literature are very taxing on either the server or the client side. In this paper, we introduce a novel solution based on Bloom filters that provides a flexible, scalable, and provably secure solution to the weaknesses of deduplication, and that overcomes the deficiencies of existing approaches. We provide a formal description of the scheme, a thorough security analysis, and compare our solution against multiple existing ones, both analytically and by means of extensive benchmarking. Our results confirm the quality and viability of our approach.
UR - https://ieeexplore.ieee.org/document/6997518
UR - http://www.scopus.com/inward/record.url?scp=84921497787&partnerID=8YFLogxK
U2 - 10.1109/CNS.2014.6997518
DO - 10.1109/CNS.2014.6997518
M3 - Conference contribution
SN - 9781479958900
SP - 481
EP - 489
BT - 2014 IEEE Conference on Communications and Network Security, CNS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
ER -