SecReS: A secure and reliable storage scheme for cloud with client-side data deduplication

Tariqul Islam, Hassan Mistareehi, D. Manivannan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

In this paper, we propose a cloud storage scheme which simultaneously achieves security, reliability, and deduplication. Our scheme blends convergent encryption and perfect secret sharing method to achieve confidentiality of data and encryption keys. It also achieves fault tolerance by dispersing data to multiple storage servers using Reed-Solomon erasure code. We use Merkle hash tree to authenticate users by verifying Proof of Ownership (PoW) of data for carrying out secure deduplication. Both theoretical security analysis and experimental evaluation demonstrate that our scheme is provably secure and incurs only a small overhead compared to the existing systems.

Original languageEnglish
Title of host publication2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings
ISBN (Electronic)9781728109626
DOIs
StatePublished - Dec 2019
Event2019 IEEE Global Communications Conference, GLOBECOM 2019 - Waikoloa, United States
Duration: Dec 9 2019Dec 13 2019

Publication series

Name2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings

Conference

Conference2019 IEEE Global Communications Conference, GLOBECOM 2019
Country/TerritoryUnited States
CityWaikoloa
Period12/9/1912/13/19

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Keywords

  • Authentication
  • Deduplication
  • Erasure Coding
  • Merkle Tree
  • Reliability
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Signal Processing
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Media Technology
  • Health Informatics

Fingerprint

Dive into the research topics of 'SecReS: A secure and reliable storage scheme for cloud with client-side data deduplication'. Together they form a unique fingerprint.

Cite this