Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

被引:43
作者
Cui, Hui [1 ]
Deng, Robert H. [2 ]
Li, Yingjiu [2 ]
Wu, Guowei [2 ]
机构
[1] Singapore Management Univ, Secure Mobile Ctr, Sch Informat Syst, Singapore 188065, Singapore
[2] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
新加坡国家研究基金会;
关键词
ABE; storage; deduplication;
D O I
10.1109/TBDATA.2017.2656120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication, which is crucial for eliminating duplicate copies of identical data in order to save storage space and network bandwidth. In this paper, we present an attribute-based storage system with secure deduplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages the storage. Compared with the prior data deduplication systems, our system has two advantages. First, it can be used to confidentially share data with users by specifying access policies rather than sharing decryption keys. Second, it achieves the standard notion of semantic security for data confidentiality while existing systems only achieve it by defining a weaker security notion. In addition, we put forth a methodology to modify a ciphertext over one access policy into ciphertexts of the same plaintext but under other access policies without revealing the underlying plaintext.
引用
收藏
页码:330 / 342
页数:13
相关论文
共 35 条
  • [1] Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
  • [2] Charm: a framework for rapidly prototyping cryptosystems
    Akinyele, Joseph A.
    Garman, Christina
    Miers, Ian
    Pagano, Matthew W.
    Rushanan, Michael
    Green, Matthew
    Rubin, Aviel D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) : 111 - 128
  • [3] Caveats associated with the use of human cervical tissue for HIV and microbicide research
    Anderson, Deborah J.
    Pudney, Jeffrey
    Schust, Danny J.
    [J]. AIDS, 2010, 24 (01) : 1 - 4
  • [4] [Anonymous], 1985, P 17 ANN ACM S THEOT
  • [5] [Anonymous], 1996, SECURE SCHEMES SECRE
  • [6] Bellare M., 2013, USENIX C SEC, P179
  • [7] Interactive Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 516 - 538
  • [8] Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    Ristenpart, Thomas
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
  • [9] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [10] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213