Home > Papers

 
 
Secure Cloud Storage with Data De-duplication
Wan Lei 1 #,Wang Chunlu 1 *,Liu Chuanyi 2
1.School of Computer Science and Technology, Bejing University of Posts and Telecommunications, Beijing 100876
2.Software School, Beijing University of Posts and Telecommunications, Beijing 100876
*Correspondence author
#Submitted by
Subject:
Funding: none
Opened online:21 June 2012
Accepted by: none
Citation: Wan Lei,Wang Chunlu,Liu Chuanyi.Secure Cloud Storage with Data De-duplication[OL]. [21 June 2012] http://en.paper.edu.cn/en_releasepaper/content/4482237
 
 
reducing the amount of data need to be transferred, stored, and managed becomes a crucial for cloud storage. On the other hand, as user data are stored and processed by outsourced cloud provider, encryption becomes a necessary before updating data into the cloud. However, the above two goals are greatly opposed to each other. In order to solve the above conflict, a policy-based de-duplication proxy scheme is proposed in this paper. It suggests a policy-based de-duplication proxy scheme to enable different trust relations among cloud storage components, de-duplication related components and different security requirements. Further proposes a key management mechanism to access and decrypt the shared de-duplicated data chunks based on Proxy Re-encryption algorithms. This paper finally analyses the security of the scheme.
Keywords:Cloud Storage; Encryption; Data De-duplication; Proxy Re-encryption; Convergent Encryption
 
 
 

For this paper

  • PDF (0B)
  • ● Revision 0   
  • ● Print this paper
  • ● Recommend this paper to a friend
  • ● Add to my favorite list

    Saved Papers

    Please enter a name for this paper to be shown in your personalized Saved Papers list

Tags

Add yours

Related Papers

Statistics

PDF Downloaded 741
Bookmarked 0
Recommend 5
Comments Array
Submit your papers