دانلود مقاله ISI انگلیسی شماره 74108
ترجمه فارسی عنوان مقاله

داده های چندپردازنده چندپخشی امن در محاسبات ابری

عنوان انگلیسی
Secure multi-server-aided data deduplication in cloud computing
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
74108 2015 9 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Pervasive and Mobile Computing, Volume 24, December 2015, Pages 129–137

ترجمه کلمات کلیدی
داده کاوی، سرور کمک، حمله ی خشونت آمیز، به اشتراک گذاری مخفیانه قابل تأیید
کلمات کلیدی انگلیسی
Data deduplication; Server-aided; Brute-force attack; Verifiable secret sharing

چکیده انگلیسی

Cloud computing enables on-demand and ubiquitous access to a centralized pool of configurable resources such as networks, applications, and services. This makes that huge of enterprises and individual users outsource their data into the cloud server. As a result, the data volume in the cloud server is growing extremely fast. How to efficiently manage the ever-increasing datum is a new security challenge in cloud computing. Recently, secure deduplication techniques have attracted considerable interests in the both academic and industrial communities. It can not only provide the optimal usage of the storage and network bandwidth resources of cloud storage providers, but also reduce the storage cost of users. Although convergent encryption has been extensively adopted for secure deduplication, it inevitably suffers from the off-line brute-force dictionary attacks since the message usually can be predictable in practice. In order to address the above weakness, the notion of DupLESS was proposed in which the user can generate the convergent key with the help of a key server. We argue that the DupLESS does not work when the key server is corrupted by the cloud server. In this paper, we propose a new multi-server-aided deduplication scheme based on the threshold blind signature, which can effectively resist the collusion attack between the cloud server and multiple key servers. Furthermore, we prove that our construction can achieve the desired security properties.