TY - GEN
T1 - Secure storage with replication and transparent deduplication
AU - Leontiadis, Iraklis
AU - Curtmola, Reza
N1 - Publisher Copyright:
© 2018 Association for Computing Machinery.
PY - 2018/3/13
Y1 - 2018/3/13
N2 - We seek to answer the following question: To what extent can we deduplicate replicated storage ? To answer this question, we design ReDup, a secure storage system that provides users with strong integrity, reliability, and transparency guarantees about data that is outsourced at cloud storage providers. Users store multiple replicas of their data at different storage servers, and the data at each storage server is deduplicated across users. Remote data integrity mechanisms are used to check the integrity of replicas. We consider a strong adversarial model, in which collusions are allowed between storage servers and also between storage servers and dishonest users of the system. A cloud storage provider (CSP) could store less replicas than agreed upon by contract, unbeknownst to honest users. ReDup defends against such adversaries by making replica generation to be time consuming so that a dishonest CSP cannot generate replicas on the fly when challenged by the users.
AB - We seek to answer the following question: To what extent can we deduplicate replicated storage ? To answer this question, we design ReDup, a secure storage system that provides users with strong integrity, reliability, and transparency guarantees about data that is outsourced at cloud storage providers. Users store multiple replicas of their data at different storage servers, and the data at each storage server is deduplicated across users. Remote data integrity mechanisms are used to check the integrity of replicas. We consider a strong adversarial model, in which collusions are allowed between storage servers and also between storage servers and dishonest users of the system. A cloud storage provider (CSP) could store less replicas than agreed upon by contract, unbeknownst to honest users. ReDup defends against such adversaries by making replica generation to be time consuming so that a dishonest CSP cannot generate replicas on the fly when challenged by the users.
KW - Deduplication
KW - RDIC
KW - Remote data integrity checking
KW - Replication
UR - http://www.scopus.com/inward/record.url?scp=85052018204&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85052018204&partnerID=8YFLogxK
U2 - 10.1145/3176258.3176315
DO - 10.1145/3176258.3176315
M3 - Conference contribution
AN - SCOPUS:85052018204
T3 - CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
SP - 13
EP - 23
BT - CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
PB - Association for Computing Machinery, Inc
T2 - 8th ACM Conference on Data and Application Security and Privacy, CODASPY 2018
Y2 - 19 March 2018 through 21 March 2018
ER -