Secure auditing and deduplication for encrypted cloud data supporting ownership modification

被引:0
|
作者
Jianli Bai
Jia Yu
Xiang Gao
机构
[1] Qingdao University,College of Computer Science and Technology
[2] Institute of Information Engineering,State Key Laboratory of Information Security
[3] Chinese Academy of Sciences,undefined
来源
Soft Computing | 2020年 / 24卷
关键词
Cloud storage; Integrity auditing; Deduplication; Ownership modification; Re-encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Storing only one unique copy of the same cloud data and guaranteeing its integrity are two main goals for cloud storage auditing and deduplication schemes. In such schemes, data owners can firmly believe the data integrity by periodically auditing and the cloud server can save lots of storage space by exploiting the duplication techniques. However, when a data owner deletes or modifies his outsourced data, he should lose the ownership for the original data and should not be able to successfully retrieve this data any more. For all we know, existing cloud storage auditing and deduplication literatures fail to support the modifications of ownership, which actually occur quite often in actual cloud storage scenarios. In this paper, we propose the first deduplicated data integrity auditing scheme supporting the ownership modification. It guarantees the integrity of the outsourced data and supports the dynamic access control over the outsourced data. We employ a re-encryption algorithm and the secure identity-based broadcast encryption technology, which prevent data from being disclosed to the revoked owners, even if they previously had prior ownership of these data. The security and efficiency of our proposed scheme have been validated by detailed analysis and experiments.
引用
收藏
页码:12197 / 12214
页数:17
相关论文
共 50 条
  • [1] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Bai, Jianli
    Yu, Jia
    Gao, Xiang
    SOFT COMPUTING, 2020, 24 (16) : 12197 - 12214
  • [2] Secure and efficient cloud data deduplication supporting dynamic data public auditing
    Ma, Hua
    Han, Xiaoyu
    Peng, Ting
    Zhang, Linchao
    International Journal of Network Security, 2018, 20 (06) : 1074 - 1084
  • [3] Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Xiang, Tao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3545 - 3561
  • [4] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [5] Secure Encrypted Data With Authorized Deduplication in Cloud
    Xiong, Jinbo
    Zhang, Yuanyuan
    Tang, Shaohua
    Liu, Ximeng
    Yao, Zhiqiang
    IEEE ACCESS, 2019, 7 : 75090 - 75104
  • [6] Secure Cloud Encrypted Data Deduplication Method
    Zhang S.-G.
    Xian H.-Q.
    Wang L.-M.
    Liu H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (12): : 3815 - 3828
  • [7] Secure auditing and deduplication with efficient ownership management for cloud storage
    Wang, Min
    Xu, Lujun
    Hao, Rong
    Yang, Ming
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [8] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [9] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [10] Secure Encrypted Data Deduplication with Ownership Proof and User Revocation
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 297 - 312