Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in Cloud Storage

被引:1
|
作者
Tang, Xin [1 ]
Jin, Luchao [1 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing, Peoples R China
来源
2024 IEEE 17TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD 2024 | 2024年
基金
中国国家自然科学基金;
关键词
Ciphertext deduplication; cloud storage; brute-force attack; collusion attack; existence privacy; ATTACKS; EFFICIENT; SCHEME;
D O I
10.1109/CLOUD62652.2024.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext deduplication is an emerging technique to eliminate redundancy in cloud storage with data confidentiality guaranteed. However, the encryption key has to be synchronized among different owners of the same data, which in turn makes the existing deduplication schemes suffer from security problems such as brute-force attacks and the collusion attack. In order to deal with them in a lightweight way, we propose a data splitting based double layer encryption for secure ciphertext deduplication in cloud storage, which is the first work to solve the problem of privacy exposure at a fundamental level. Specifically, we propose a bloom filter based data splitting method and a double layer encryption based deduplication framework. Because of the high collisional property of the feature extraction method, the same content could be extracted from similar data with a great probability. By encrypting it with a shared key, and the remaining part with the secret key of the uploader, the existence privacy is well protected during the process of ciphertext deduplication as a result. According to the experimental results compared with the state-of-the art, the communication and storage overhead can be reduced over 82.28% and 5.55% under the proposed scheme, which shows that secure ciphertext deduplication can be achieved in a lightweight way.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
  • [1] ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
    Ebinazer, Silambarasan Elkana
    Savarimuthu, Nickolas
    Bhanu, S. Mary Saira
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3309 - 3325
  • [2] Secure and Efficient Cloud Ciphertext Deduplication Based on SGX
    Li, Limin
    Qin, Guiyun
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 696 - 703
  • [3] Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage
    Shin, Youngjoo
    Koo, Dongyoung
    Yun, Joobeom
    Hur, Junbeom
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1021 - 1033
  • [4] ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
    Silambarasan Elkana Ebinazer
    Nickolas Savarimuthu
    S. Mary Saira Bhanu
    Wireless Personal Communications, 2021, 117 : 3309 - 3325
  • [5] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [6] A Review on Secure Data Deduplication: Cloud Storage Security Issue
    Prajapati, Priteshkumar
    Shah, Parth
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 3996 - 4007
  • [7] Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers
    Zhang, Yuan
    Xu, Chunxiang
    Cheng, Nan
    Shen, Xuemin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [8] FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
    Jiang, Tao
    Yuan, Xu
    Chen, Yuan
    Cheng, Ke
    Wang, Liangmin
    Chen, Xiaofeng
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2466 - 2483
  • [9] Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication
    Jiang, Changsong
    Xu, Chunxiang
    Yang, Guomin
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 396 - 413
  • [10] Convergent encryption enabled secure data deduplication algorithm for cloud environment
    Ahmad, Shahnawaz
    Arif, Mohd.
    Ahmad, Javed
    Nazim, Mohd.
    Mehfuz, Shabana
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (21)