A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shin, Youngjoo | - |
dc.contributor.author | Koo, Dongyoung | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2021-09-03T10:31:27Z | - |
dc.date.available | 2021-09-03T10:31:27Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2017-02 | - |
dc.identifier.issn | 0360-0300 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/84807 | - |
dc.description.abstract | Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly accepted, it comes with many security and privacy problems due to the outsourced data delivery models of cloud storage. To deal with specific security and privacy issues, secure deduplication techniques have been proposed for cloud data, leading to a diverse range of solutions and trade-offs. Hence, in this article, we discuss ongoing research on secure deduplication for cloud data in consideration of the attack scenarios exploited most widely in cloud storage. On the basis of classification of deduplication system, we explore security risks and attack scenarios from both inside and outside adversaries. We then describe state-of-the-art secure deduplication techniques for each approach that deal with different security issues under specific or combined threat models, which include both cryptographic and protocol solutions. We discuss and compare each scheme in terms of security and efficiency specific to different security goals. Finally, we identify and discuss unresolved issues and further research challenges for secure deduplication in cloud storage. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.subject | PROVABLE OWNERSHIP | - |
dc.subject | EFFICIENT | - |
dc.subject | INFORMATION | - |
dc.subject | FILES | - |
dc.title | A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hur, Junbeom | - |
dc.identifier.doi | 10.1145/3017428 | - |
dc.identifier.scopusid | 2-s2.0-85011418894 | - |
dc.identifier.wosid | 000399116400015 | - |
dc.identifier.bibliographicCitation | ACM COMPUTING SURVEYS, v.49, no.4 | - |
dc.relation.isPartOf | ACM COMPUTING SURVEYS | - |
dc.citation.title | ACM COMPUTING SURVEYS | - |
dc.citation.volume | 49 | - |
dc.citation.number | 4 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | PROVABLE OWNERSHIP | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | INFORMATION | - |
dc.subject.keywordPlus | FILES | - |
dc.subject.keywordAuthor | Message-dependent encryption | - |
dc.subject.keywordAuthor | proof of ownership | - |
dc.subject.keywordAuthor | traffic obfuscation | - |
dc.subject.keywordAuthor | deterministic information dispersal | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.