Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags

被引:3
|
作者
Ha, Guanxiong [1 ,2 ]
Jia, Chunfu [1 ,2 ]
Huang, Yixuan [1 ,2 ]
Chen, Hang [1 ,2 ]
Li, Ruiqi [3 ]
Jia, Qiaowen [4 ]
机构
[1] Nankai Univ, Coll Cyber Sci, DISSec, Tianjin 300350, Peoples R China
[2] Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
[3] Civil Aviat Univ China, Coll Safety Sci & Engn, Tianjin 300300, Peoples R China
[4] Univ Chinese Acad Sci, Chinese Acad Sci, Inst Software, Beijing 101408, Peoples R China
基金
中国国家自然科学基金;
关键词
Servers; Security; Encryption; Cloud computing; Protocols; Semantics; Scalability; Cloud storage; data popularity; data privacy; encrypted deduplication; multi-tenant; HOMOMORPHIC ENCRYPTION;
D O I
10.1109/TDSC.2023.3285173
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is non-trivial to provide semantic security for user data while achieving deduplication in cloud storage. Some studies deploy a trusted party to store deterministic tags for recording data popularity, then provide different levels of security for data according to popularity. However, deterministic tags are vulnerable to offline brute-force attacks. In this article, we first propose a popularity-based secure deduplication scheme with fully random tags, which avoids the storage of deterministic tags. Our scheme uses homomorphic encryption (HE) to generate comparable random tags to record data popularity and then uses the binary search in the AVL tree to accelerate the tag comparisons. Besides, we find the popularity tamper attacks in existing schemes and design a proof of ownership (PoW) protocol against it. To achieve scalability and updatability, we introduce the multi-key homomorphic proxy re-encryption (MKH-PRE) to design a multi-tenant scheme. Users in different tenants generate tags using different key pairs, and the cross-tenant tags can be compared for equality. Meanwhile, our multi-tenant scheme supports efficient key updates. We give comprehensive security analysis and conduct performance evaluations based on both synthetic and real-world datasets. The results show that our schemes achieve efficient data encryption and key update, and have high storage efficiency.
引用
收藏
页码:1484 / 1500
页数:17
相关论文
共 15 条
  • [1] A secure deduplication scheme based on data popularity with fully random tags
    Ha, Guanxiong
    Chen, Hang
    Jia, Chunfu
    Li, Ruiqi
    Jia, Qiaowen
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 207 - 214
  • [2] Lightweight Secure Deduplication Based on Data Popularity
    Wang, Zhiqiang
    Gao, Wenjing
    Yu, Jia
    Shen, Wengting
    Hao, Rong
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5531 - 5542
  • [3] Privacy-preserving popularity-based deduplication against malicious behaviors of the cloud
    Ge, Xiaowei
    Ha, Guanxiong
    Jia, Chunfu
    Su, Zhen
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 245 - 256
  • [4] Popularity-based scalable peer-to-peer topology growth
    Gunduz, Gurhan
    Yuksel, Murat
    COMPUTER NETWORKS, 2016, 100 : 124 - 140
  • [5] Secure Encrypted Data Deduplication Based on Data Popularity
    Yunlong He
    Hequn Xian
    Liming Wang
    Shuguang Zhang
    Mobile Networks and Applications, 2021, 26 : 1686 - 1695
  • [6] Secure Encrypted Data Deduplication Based on Data Popularity
    He, Yunlong
    Xian, Hequn
    Wang, Liming
    Zhang, Shuguang
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1686 - 1695
  • [7] Data popularity-based encrypted deduplication scheme without third-party servers
    Ha, Guanxiong
    Jia, Qiaowen
    Chen, Hang
    Jia, Chunfu
    Tongxin Xuebao/Journal on Communications, 2022, 43 (08): : 17 - 29
  • [8] Bifrost: A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
    Sehat, Hadi
    Lucani, Daniel E.
    Pagnin, Elena
    PROCEEDINGS OF THE 2022 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET 2022), 2022, : 203 - 210
  • [9] Random chunks attachment strategy based secure deduplication for cloud data
    Genghao L.
    Ziji Z.
    Xin T.
    Yiteng Z.
    Yuqi Z.
    Tianyang Q.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (05): : 212 - 228
  • [10] Secure Data Deduplication Scheme Based on Distributed Random Key in Integrated Networks
    Qi, Hui
    Han, Yingjie
    Di, Xiaoqiang
    Sun, Fang
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1308 - 1312