Secure deduplication with efficient user revocation in cloud storage

被引:12
作者
Wang, Yunling [1 ]
Miao, Meixia [1 ]
Wang, Jianfeng [2 ]
Zhang, Xuefeng [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Deduplication; User revocation; Updatable encryption; VERIFIABLE DATABASES;
D O I
10.1016/j.csi.2021.103523
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure deduplication is a promising solution to greatly reduce the storage space of the cloud. However, the encryption key is deterministically derived from the plaintext, such that who owns the plaintext has the derived key to decrypt the ciphertext. Therefore, how to revoke a user in deduplication schemes is a critical challenge. In the existing work, when updating the data authority, the data owner has to download the data from the cloud, decrypt, re-encrypt and finally upload them to the cloud. This process increases the communication and computation overheads. In this paper, we first propose a multi-user updatable encryption scheme. Specifically, the data owner can update the remote ciphertext under a new group key by sending an update token to the cloud. Then we adopt this technique to propose a new secure deduplication scheme supporting efficiently revoking an unauthorized user. In our scheme, the data owner just needs to send a token to the cloud to update the data authority, which saves the communication and computation costs. The security and efficiency analysis demonstrate that our proposed deduplication scheme can achieve the desired security properties with high efficiency.
引用
收藏
页数:8
相关论文
共 29 条
[1]  
Bai J., 2020, SOFT COMPUT, V24
[2]  
Bellare Mihir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P179
[3]   Message-Locked Encryption and Secure Deduplication [J].
Bellare, Mihir ;
Keelveedhi, Sriram ;
Ristenpart, Thomas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 :296-312
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8042, P410, DOI 10.1007/978-3-642-40041-4_23
[6]   Fast and Secure Updatable Encryption [J].
Boyd, Colin ;
Davies, Gareth T. ;
Gjosteen, Kristian ;
Jiang, Yao .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 :464-493
[7]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556
[8]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[9]   Reclaiming space from duplicate files in a serverless distributed file system [J].
Douceur, JR ;
Adya, A ;
Bolosky, WJ ;
Simon, D ;
Theimer, M .
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, :617-624
[10]  
Duan Y., 2014, P 6 ED ACM WORKSH CL, P57