Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage

被引:5
作者
Qi, Saiyu [1 ]
Wei, Wei [1 ]
Wang, Jianfeng [2 ]
Sun, Shifeng [3 ]
Rutkowski, Leszek [4 ,5 ]
Huang, Tingwen [6 ]
Kacprzyk, Janusz [7 ]
Qi, Yong [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian 710049, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[3] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[4] AGH Univ Sci & Technol, Polish Acad Sci, Syst Res Inst, PL-30059 Krakow, Poland
[5] Univ Social Sci, PL-90229 Lodz, Poland
[6] Texas A&M Univ Qatar, Dept Sci, Doha 23874, Qatar
[7] Polish Acad Sci, Syst Res Inst, PL-02668 Warsaw, Poland
基金
中国国家自然科学基金;
关键词
Cloud computing; Access control; Cryptography; Encryption; Maximum likelihood estimation; Mobile handsets; Threat modeling; Dynamic access control; mobile cloud computing; secure data deduplication; EFFICIENT;
D O I
10.1109/TMC.2023.3263901
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication is of vital importance for mobile cloud computing to cope with the explosive growth of outsourced mobile data. In order to ensure the privacy of sensitive mobile data against an untrusted cloud, Message-Locked Encryption (MLE) has been proposed to enable deduplication over ciphertext. However, MLE prohibits data access control since it uses deterministic content-derived encryption keys. Recently, a lightweight rekeying-aware encrypted deduplication system (REED) has been proposed to achieve dynamic access control for secure data deduplication. However, REED is vulnerable to key-retaining attack and stub-retaining attack, which leads to insecure access revocation, and thus cannot support secure dynamic access control. In response, we present AC-Dedup, an encrypted deduplication storage system that supports secure dynamic access control for mobile cloud storage. At the core of AC-Dedup are two novel encryption techniques named mixed message locked encryption and random stub re-encryption to resist the two types of attacks, respectively. To the best of our knowledge, AC-Dedup is the first practical system that achieves secure data deduplication and secure dynamic access control simultaneously. We conduct security analysis and experimental evaluation on mobile device and cloud platform with real-world IoT datasets. The results show that AC-Dedup enables secure and efficient dynamic access control while preserving deduplication effectiveness.
引用
收藏
页码:2566 / 2582
页数:17
相关论文
共 41 条
[1]   Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges [J].
Abolfazli, Saeid ;
Sanaei, Zohreh ;
Ahmed, Ejaz ;
Gani, Abdullah ;
Buyya, Rajkumar .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :337-368
[2]   Towards Understanding the Known-Key Security of Block Ciphers [J].
Andreeva, Elena ;
Bogdanov, Andrey ;
Mennink, Bart .
FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 :348-366
[3]  
Bacis E., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, P217
[4]  
Beckel C., 2014, P 1 ACM C EMB SYST E, P80, DOI [DOI 10.1145/2674061.2674064, 10.1145/2674061.2674064]
[5]  
Bellare M., 2013, P 22 USENIX C SEC, P1, DOI DOI 10.1109/MPRV.2013.43
[6]   Message-Locked Encryption and Secure Deduplication [J].
Bellare, Mihir ;
Keelveedhi, Sriram ;
Ristenpart, Thomas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 :296-312
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8042, P410, DOI 10.1007/978-3-642-40041-4_23
[9]   Reclaiming space from duplicate files in a serverless distributed file system [J].
Douceur, JR ;
Adya, A ;
Bolosky, WJ ;
Simon, D ;
Theimer, M .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :617-624
[10]  
Eijs H., 2019, Pycryptodome-the Python cryptography toolkit