广义去重是实现云数据安全去重的一种重要手段。现有的广义去重方法仅支持精确去重,且无法与图像加密技术有机结合。而图像加密技术本身也将给用户带来巨大的计算开销。针对以上挑战,本文提出一种基于模糊广义去重的图像轻量级安全云存储方法。首先对图像数据开展整数小波变换并提取低频分量作为基,高频分量作为偏移量,通过提出一种基于异或的轻量级加密算法,把图像的机密性保护方法与广义去重技术有机结合。此外,本文还对偏移量进行云端模糊去重,使得云端仅保存高度相似的偏移量数据的单个副本,实现了图像云数据的模糊广义去重。在相关的图像数据集上开展实验,结果表明在实现安全性的前提下,本文所提方法在改善通信效率和存储效率上有显著效果。
Generalized deduplication is an effective technique to achieve secure deduplication for cloud images. However, the existing generalized deduplication technique only supports precise deduplication and cannot be integrated with encryption technique for images. Furthermore, image encryption techniques impose substantial computational overhead on clients. To deal with the above challenges, we propose a fuzzy generalized deduplicationbased lightweight secure cloud storage method for images. Firstly, the integer wavelet transform is applied to extract the low-frequency components as bases and high-frequency ones as deviations. By proposing a lightweight encryption scheme based on XOR, the confidentiality protection for images is effectively integrated with the generalized deduplication technique. In addition, the proposed scheme also supports fuzzy deduplication for deviations, ensuring that the cloud service provider only stored a single copy of highly similar deviations, thereby achieving fuzzy generalized deduplication for cloud images. Finally, we conduct experiments on related image datasets. The results show that the proposed scheme significantly improves both communication and storage efficiency while ensuring security.
[1] Xia W, Jiang H, Feng D, et al. A comprehensive study of the past, present, and future of data deduplication [J]. Proceedings of the IEEE, 2016, 104(9): 1681-1710.
[2] Akarsha D P, Chaudhari S, Apama R. Coarse-to-fine secure image deduplication with Merkle-Hash and image features for cloud storage [C]//2021 Asian Conference on Innovation in Technology (ASIANCON), 2021: 1-6.
[3] Agarwala A, Singh P, Atrey P K. Client side secure image deduplication using DICE protocol [C]//2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 2018: 412-417.
[4] Digitalvolcano Software Limited. Duplicate cleaner [EB/OL]. [2023-12-23]. https://www.duplicatecleaner.com/.
[5] Pattabhi R N, Krishna M C. De-duplication of photograph images using histogram refinement [C]//2011 IEEE Recent Advances in Intelligent Computational Systems, 2011: 391-395.
[6] Vestergaard R, Zhang Q, Lucani D E. Generalized deduplication: bounds, convergence, and asymptotic properties [C]//2019 IEEE Global Communications Conference (GLOBECOM), 2019: 1-6.
[7] Tang X, Liu Z, Shao Y, et al. Side channel attack resistant cross-user generalized deduplication for cloud storage [C]//ICC 2022-IEEE International Conference on Communications, 2022: 998- 1003.
[8] Douceur J R, Adya A, Bolosky W J, et al. Reclaiming space from duplicate files in a serverless distributed file system [C]//Proceedings 22nd International Conference on Distributed Computing Systems, 2002: 617-624.
[9] Bellare M, Keelveedhi S, Ristenpart T. Message-locked encryption and secure deduplication [C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2013: 296-312.
[10] Liu J, Asokan N, Pinkas B. Secure deduplication of encrypted data without additional independent servers [C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015: 874-885.
[11] 唐鑫, 周琳娜, 单伟杰, 等. 基于阈值重加密的抗边信道攻击云数据安全去重方法[J]. 通信学报, 2020, 41(6): 98-111. Tang X, Zhou L N, Shan W J, et al. Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack [J]. Journal on Communications, 2020, 41(6): 98-111. (in Chinese)
[12] Zuo P F, Hua Y, Wang C, et al. Mitigating traffic-based side channel attacks in bandwidthefficient cloud storage [C]//2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2018: 1153-1162.
[13] Tang X, Zhang Y, Zhou L N, et al. Request merging based cross-user deduplication for cloud storage with resistance against appending chunks attack [J]. Chinese Journal of Electronics, 2021, 30(2): 199-209.
[14] Tang X, Chen X, Zhou R, et al. Marking based obfuscation strategy to resist side channel attack in cross-user deduplication for cloud storage [C]//2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022: 547-555.
[15] Yu C M, Gochhayat S P, Conti M, et al. Privacy aware data deduplication for side channel in cloud storage [J]. IEEE Transactions on Cloud Computing, 2020, 8(2): 597-609.
[16] 林耿豪, 周子集, 唐鑫, 等. 采用随机块附加策略的云数据安全去重方法[J]. 西安电子科技大学学报, 2023, 50(5): 212-228. Lin G H, Zhou Z J, Tang X, et al. Random chunks attachment strategy based secure deduplication for cloud data [J]. Journal of Xidian University, 2023, 50(5): 212-228. (in Chinese)
[17] Zhang Q, Guo L, Wei X P. Image encryption using DNA addition combining with chaotic maps [J]. Mathematical and Computer Modelling, 2010, 52(11/12): 2028-2035.
[18] Gupta T, Sharma A K, Selwal A. A lightweight image cryptography approach via invertible transformation [C]//202315th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2023: 1-6.
[19] Alexan W, Elbeltagy M, Aboshousha A. Lightweight image encryption: cellular automata and the Lorenz system [C]//2021 International Conference on Microelectronics (ICM), 2021: 34-39.
[20] Li X, Li J, Huang F L. A secure cloud storage system supporting privacy-preserving fuzzy deduplication [J]. Soft Computing, 2016, 20(4): 1437-1448.
[21] Takeshita J, Karl R, Jung T. Secure single-server nearly-identical image deduplication [C]//2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020: 1-6.
[22] Jiang T, Yuan X, Chen Y, et al. FuzzyDedup: secure fuzzy deduplication for cloud storage [J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(3): 2466-2483.
[23] Liu X M, Tang X, Jin L C, et al. Secure cross-user fuzzy deduplication for images in cloud storage [C]//International Conference on Data Mining and Big Data. Springer, 2022: 291-302.
[24] Thanoon B N. Using wavelet transform, DPCM and adaptive run-length coding to compress images [C]//6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM’07), 2007: 305-309.
[25] Daubechies I, Sweldens W. Factoring wavelet transforms into lifting steps [J]. Journal of Fourier Analysis and Applications, 1998, 4(3): 247-269.