Two-party interactive secure deduplication with efficient data ownership management in cloud storage

被引:9
作者
Guo, Cheng [1 ,2 ,3 ]
Wang, Litao [1 ,2 ]
Tang, Xinyu [1 ,2 ]
Feng, Bin [4 ]
Zhang, Guofeng [4 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaonin, Dalian 116620, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[4] Taishan Univ, Sch Informat Sci & Technol, Tai An 271000, Peoples R China
基金
美国国家科学基金会;
关键词
Cloud storage; Secure deduplication; Two-party interaction; Ownership management; Key-sharing; Re-encryption; ENCRYPTION;
D O I
10.1016/j.jisa.2023.103426
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication, which stores only one copy of duplicate data, is used extensively in cloud storage to reduce the overhead associated with storage. Unfortunately, client-side encryption prevents cloud storage from performing deduplication due to the randomness of traditional encryption. Some existing schemes can balance encryption and deduplication, but their interaction with third-party servers or online users adds additional overhead to the system. Also, the ownership of outsourced data will change frequently due to users' requests to upload/delete/modify the data. But many existing schemes that can achieve dynamic ownership management have security flaws or require users to manage multiple keys. By focusing on these troubles, we have developed a secure deduplication scheme that does not rely on any third-party entities and supports data ownership management. More specifically, we take advantage of elliptic curve cryptography to design a key-sharing method so that different owners of the same data can share a random key only by interacting with the cloud service provider. And the broadcast encryption is used to manage the ownership of data, and this allows the cloud service provider to control users' access to outsourced data by updating the broadcast key. In addition, the security analysis shows that the proposed scheme can meet the required security and that it outperforms other related schemes. The detailed simulation comparisons with other related schemes demonstrate that the proposed scheme has good performance.
引用
收藏
页数:13
相关论文
共 26 条
[1]  
Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
[2]   Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption [J].
Al-Dahhan, Ruqayah R. ;
Shi, Qi ;
Lee, Gyu Myoung ;
Kifayat, Kashif .
SENSORS, 2019, 19 (07)
[3]  
Bellare M, 2013, P 22 USENIX C SEC, P179, DOI DOI 10.1109/MPRV.2013.43
[4]   Message-Locked Encryption and Secure Deduplication [J].
Bellare, Mihir ;
Keelveedhi, Sriram ;
Ristenpart, Thomas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 :296-312
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[7]  
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[8]  
Dodis Y, 2012, LECT NOTES COMPUT SC, V7194, P618, DOI 10.1007/978-3-642-28914-9_35
[9]   Reclaiming space from duplicate files in a serverless distributed file system [J].
Douceur, JR ;
Adya, A ;
Bolosky, WJ ;
Simon, D ;
Theimer, M .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :617-624
[10]  
dropbox, 2017, About Us