Secure storage with replication and transparent deduplication

Iraklis Leontiadis, Reza Curtmola

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

We seek to answer the following question: To what extent can we deduplicate replicated storage ? To answer this question, we design ReDup, a secure storage system that provides users with strong integrity, reliability, and transparency guarantees about data that is outsourced at cloud storage providers. Users store multiple replicas of their data at different storage servers, and the data at each storage server is deduplicated across users. Remote data integrity mechanisms are used to check the integrity of replicas. We consider a strong adversarial model, in which collusions are allowed between storage servers and also between storage servers and dishonest users of the system. A cloud storage provider (CSP) could store less replicas than agreed upon by contract, unbeknownst to honest users. ReDup defends against such adversaries by making replica generation to be time consuming so that a dishonest CSP cannot generate replicas on the fly when challenged by the users.

Original languageEnglish (US)
Title of host publicationCODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery, Inc
Pages13-23
Number of pages11
ISBN (Electronic)9781450356329
DOIs
StatePublished - Mar 13 2018
Externally publishedYes
Event8th ACM Conference on Data and Application Security and Privacy, CODASPY 2018 - Tempe, United States
Duration: Mar 19 2018Mar 21 2018

Publication series

NameCODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
Volume2018-January

Other

Other8th ACM Conference on Data and Application Security and Privacy, CODASPY 2018
Country/TerritoryUnited States
CityTempe
Period3/19/183/21/18

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems
  • Software

Keywords

  • Deduplication
  • RDIC
  • Remote data integrity checking
  • Replication

Fingerprint

Dive into the research topics of 'Secure storage with replication and transparent deduplication'. Together they form a unique fingerprint.

Cite this