The key to private and efficient data storage – Phys.Org

May 1, 2017 Research sponsored by a multinational IT service provider in 2010 suggested that up to 75% of all produced data is duplicated. Credit: Wavebreak Media Ltd/ 123rf

Cloud storage services, like Dropbox and Gmail, may soon be able to better manage your content, giving you more storage capacity while still being unable to 'read' your data.

People and businesses are more often than ever storing large amounts of private data in 'the cloud' with storage service providers. To protect their clients' private information, this stored data is encrypted so that no one, including the service providers, can read it. But this makes it impossible for cloud storage providers to efficiently manage that data and provide their clients with better storage capacity. Research sponsored by a multinational IT service provider in 2010 suggested that up to 75% of all produced data is duplicated. Owners of an open source 'deduplication' solution suggest that reducing duplicate data could clear up to 95% of storage space.

For cloud storage providers to remove, or 'deduplicate', data, they need to be able to recognize it without infringing on their clients' privacy. Now, researchers at the Agency for Science, Technology and Research (A*STAR) Data Storage Institute in Singapore have developed a system that allows cloud storage providers to do just that.

The system, called HEDup, involves the use of a separate 'key server', which assigns a secure key to the data that will be encrypted and then uploaded for storage on the cloud's server. The service provider, such as Dropbox or Gmail, can then employ 'homomorphic encryption', which involves carrying out computations on the encrypted text, to detect information from the data's secure key. This allows the provider to determine, without actually reading the original data, whether it is a duplicate. Duplicate data will have the same key, which can only be accessed for encryption and decryption purposes by data owners.

The team tested its system and found that it increased the uploading time of a 16-megabyte file, which normally takes an average of 5.22 seconds, by 1.4 seconds. It also increased the downloading time by only 0.4 seconds.

The team next plans to improve the security of the key server and to develop a method for clients to upload and download data from multiple devices without the need for manually providing their private key for its encryption and decryption.

Explore further: Cloud, backup and storage deviceshow best to protect your data

We are producing more data than ever before, with more than 2.5 quintillion bytes produced every day, according to computer giant IBM. That's a staggering 2,500,000,000,000 gigabytes of data and it's growing fast.

Wider adoption of cloud storage services by organizations has been hindered by security and privacy issues. A consequence of storing data on the cloud is that, by its very nature, the storage infrastructure is not owned by ...

By securing data files with a 'need-to-know' decryption key, A*STAR researchers have developed a way to control access to cloud-hosted data in real-time, adding an extra layer of security for data-sharing via the Internet.

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

Mobile computing has become a fundamental feature in modern day life as people develop an unprecedented reliance on smart phones and tablets. However, along with their ubiquity comes a host of risks that can affect personal ...

A systematic analysis reveals that cloud storage services have security weaknesses that can inadvertently leak users' data.

Imagine wearing clothes with layers of paper that protect you from dangerous bacteria.

We've long known that breathing, blood pressure, body temperature and pulse provide an important window into the complexities of human health. But a growing body of research suggests that another vital sign - how fast you ...

A study comparing acceptance rates of contributions from men and women in an open-source software community finds that, overall, women's contributions tend to be accepted more often than men's - but when a woman's gender ...

The United States is considering a $1 trillion budget proposal to update infrastructure, including its crumbling bridges. An obstacle to spending the money wisely is that the current means of assessing bridges may underestimate ...

Explorers planning to settle on Mars might be able to turn the planet's red soil into bricks without needing to use an oven or additional ingredients. Instead, they would just need to apply pressure to compact the soilthe ...

Amazon's digital assistant Alexa is being transformed into a fashionista in a new device that was unveiled Wednesday.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Read more:
The key to private and efficient data storage - Phys.Org

Related Posts

Comments are closed.