دانلود رایگان مقاله اثبات مالکیت برای سیستم های بدون نسخه برداری

عنوان فارسی
اثبات مالکیت برای سیستم های بدون نسخه برداری: یک راه حل امن، مقیاس پذیر و کارآمد
عنوان انگلیسی
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
12
سال انتشار
2016
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E686
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و مهندسی فناوری اطلاعات و مهندسی فناوری اطلاعات و ارتباطات
گرایش های مرتبط با این مقاله
شبکه های کامپیوتری، اینترنت و شبکه های گسترده
مجله
ارتباطات کامپیوتر - Computer Communications
دانشگاه
پاریس، فرانسه
کلمات کلیدی
ابر امنیتی، حذف رکوردهای تکراری، اثبات مالکیت
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

abstract


Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files would be sufficient. Albeit simple in theory, the implementation of this concept introduces many security risks. In this paper, we address the most severe one: an adversary, possessing only a fraction of the original file, or colluding with a rightful owner who leaks arbitrary portions of it, becomes able to claim possession of the entire file. The paper’s contributions are manifold: first, we review the security issues introduced by deduplication, and model related security threats; second, we introduce a novel Proof of Ownership (POW) scheme with all the features of the state-of-the-art solution and only a fraction of its overhead. We also show that the security of the proposed mechanisms relies on information-theoretical rather than computational assumptions, and propose viable optimization techniques that further improve the scheme’s performance. Finally, the quality of our proposal is supported by extensive benchmarking.

نتیجه گیری

7. Conclusions


We have presented a suite of novel security protocols to implement proof of ownership in a deduplication scenario. Our core scheme is provably secure and achieves better performance than the state-of-the-art solution in the most sensitive areas of clientside I/O and computation. Furthermore, it is resilient to a malicious client leaking large portions of the input file to third parties, whereas other schemes described in the literature will be compromised in case of leaks that are larger than a pre-defined amount (64 MiB). On the downside, server-side I/O and computation are slightly higher than for state of the art solutions, but they can be conveniently mitigated by deferring them to moments of low system load. Note that the proposed solutions are fully customizable in the system parameters. Finally, extensive simulation results support the quality and viability of our proposal.


بدون دیدگاه