Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in Cloud Storage

被引:1
|
作者
Tang, Xin [1 ]
Jin, Luchao [1 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing, Peoples R China
来源
2024 IEEE 17TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD 2024 | 2024年
基金
中国国家自然科学基金;
关键词
Ciphertext deduplication; cloud storage; brute-force attack; collusion attack; existence privacy; ATTACKS; EFFICIENT; SCHEME;
D O I
10.1109/CLOUD62652.2024.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext deduplication is an emerging technique to eliminate redundancy in cloud storage with data confidentiality guaranteed. However, the encryption key has to be synchronized among different owners of the same data, which in turn makes the existing deduplication schemes suffer from security problems such as brute-force attacks and the collusion attack. In order to deal with them in a lightweight way, we propose a data splitting based double layer encryption for secure ciphertext deduplication in cloud storage, which is the first work to solve the problem of privacy exposure at a fundamental level. Specifically, we propose a bloom filter based data splitting method and a double layer encryption based deduplication framework. Because of the high collisional property of the feature extraction method, the same content could be extracted from similar data with a great probability. By encrypting it with a shared key, and the remaining part with the secret key of the uploader, the existence privacy is well protected during the process of ciphertext deduplication as a result. According to the experimental results compared with the state-of-the art, the communication and storage overhead can be reduced over 82.28% and 5.55% under the proposed scheme, which shows that secure ciphertext deduplication can be achieved in a lightweight way.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
  • [21] Integrating encryption techniques for secure data storage in the cloud
    Seth, Bijeta
    Dalal, Surjeet
    Jaglan, Vivek
    Dac-Nhuong Le
    Mohan, Senthilkumar
    Srivastava, Gautam
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [22] Secure Enterprise Data Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 367 - 374
  • [23] LSDedup: Layered Secure Deduplication for Cloud Storage
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Huang, Hejiao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (02) : 422 - 435
  • [24] Zero knowledge based data deduplication using in-line Block Matching protocol for secure cloud storage
    Kanagamani, Vivekrabinson
    Karuppiah, Muneeswaran
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2021, 29 (04) : 2067 - 2083
  • [25] Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
    Lee, Mira
    Seo, Minhye
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [26] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [27] Enhanced Convergent Encryption Key Generation for Secured Data Deduplication in Cloud Storage
    Uma, G.
    Jayasimman, L.
    SECOND NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2018), 2018, 1142
  • [28] Survey on Data Deduplication in Cloud Storage Environments
    Kim, Won-Bin
    Lee, Im-Yeong
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (03): : 658 - 673
  • [29] Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment
    Kim, Won-Bin
    Lee, Im-Yeong
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 539 - 545
  • [30] A key-sharing based secure deduplication scheme in cloud storage
    Wang, Liang
    Wang, Baocang
    Song, Wei
    Zhang, Zhili
    INFORMATION SCIENCES, 2019, 504 : 48 - 60