Netinfo Security ›› 2017, Vol. 17 ›› Issue (3): 39-45.doi: 10.3969/j.issn.1671-1122.2017.03.007

• Orginal Article • Previous Articles     Next Articles

Design and Implementation of Secure Deduplication System for Ciphertext Data Based on Aliyun

Jianye SONG1, Nuan HE2, Yiming ZHU1, Anmin FU1()   

  1. 1.School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing Jiangsu 210094, China
    2.China Institute of MarineTechnology & Economy, Beijing 100081, China
  • Received:2016-10-15 Online:2017-03-20 Published:2020-05-12

Abstract:

With the wide use of cloud computing service, more and more data is stored in the cloud server. To solve the problems faced by enciphered data in cloud storage system, such as detection and PoW (proofs of ownership) of duplicated ciphertext, etc, we complete a secure deduplication system for ciphertext data based on aliyun by using convergent encryption and Bloom Filter algorithm. First of all, we utilize convergent encryption method to generate a file encryption key, which implements the key shared between different users and is advantageous to cross-user ciphertext deduplication. Secondly, the proof of ownership for files is realized by Bloom filter so as to prevent the attackers with a single file hash value to obtain files efficiently. Finally, based on current cloud platform provided by aliyun, we realize the secure deduplication system and guarantee the safety of data deduplication. In addition, the results of experiments and performance analysis have proved that the scheme is efficient and feasible.

Key words: secure data deduplication, proof of ownership, convergent encryption, Bloom filter

CLC Number: