Verifiable Secure Data Deduplication Method in Cloud Storage

被引:0
|
作者
Xian H.-Q. [1 ,2 ]
Liu H.-Y. [1 ,2 ]
Zhang S.-G. [1 ]
Hou R.-T. [1 ]
机构
[1] College of Computer Science and Technology, Qingdao University, Qingdao
[2] State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an
来源
Xian, He-Qun (xianhq@126.com) | 1600年 / Chinese Academy of Sciences卷 / 31期
基金
中国国家自然科学基金;
关键词
Bilinear mapping; Broadcast encryption; Data deduplication; Group signature;
D O I
10.13328/j.cnki.jos.005628
中图分类号
学科分类号
摘要
Data deduplication technology has been widely applied in cloud storage systems. Under the premise of ensuring data privacy, how to effectively perform deduplication in semi-trusted cloud storage environments becomes one of the primary issues in cloud computing security. Current schemes rely heavily on online trusted third parties to manage data labels and to keep track of the number of users. The trusted third party plays such a vital role in those schemes that it is indispensable even at the cost of unsatisfying efficiency and potential bottleneck. A verifiable secure data deduplication scheme in cloud storage is proposed, which doesnot require any online trusted third party. The dual-tag scheme based on bilinear mapping is adopted to conduct popularity check. The tag is used to retrieve files without leaking any exploitable information. A modified group signature scheme is designed to prevent the cloud server from forging popularity query results. Users can verify the authenticity of query results from the cloud server. The multi-layered cryptosystem is adopted in the proposed scheme, in which different encryption strategies are applied according to the popularity of specific data. The correctness and security of the proposed scheme are analyzed and proved. Simulation results show that the proposed scheme is secure and efficient. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:455 / 470
页数:15
相关论文
共 35 条
  • [1] Liu J., Asokan N., Pinkas B., Secure deduplication of encrypted data without additional independent servers, Proc. of the 22nd ACM SIGSAC Conf. on Computer and Communications Security, pp. 874-885, (2015)
  • [2] Bellare M., Keelveedhi S., Ristenpart T., DupLESS: Server-aided encryption for deduplicated storage, Proc. of the Usenix Conf. on Security, pp. 179-194, (2013)
  • [3] Zhang S.G., Xian H.Q., Wang Y.Z., Liu H.Y., Hou R.T., Secure encrypted data deduplication method based on offline key distribution, Ruan Jian Xue Bao/Jornal of Software, 29, 7, pp. 1909-1921, (2018)
  • [4] Meyer D.T., Bolosky W.J., A study of practical deduplication, ACM Trans. on Storage (TOS), 7, 4, pp. 1-20, (2012)
  • [5] Baracaldo N., Androulaki E., Glider J., Sorniotti A., Reconciling end-to-end confidentiality and data reduction in cloud storage, Proc. of the 6th Edition of the ACM Workshop on Cloud Computing Security, pp. 21-32, (2014)
  • [6] Storer M.W., Greenan K., Long D.D.E., Miller E.L., Secure data deduplication, Proc. of the 4th ACM Int'l Workshop on Storage Security and Survivability, pp. 1-10, (2008)
  • [7] Koo D., Hur J., Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing, Future Generation Computer Systems, 78, 2, pp. 739-752, (2018)
  • [8] Liu J.F., Wang J.F., Tao X.L., Jian S., Secure similarity-based cloud data deduplication in Ubiquitous city, Pervasive and Mobile Computing, 41, pp. 231-242, (2017)
  • [9] Fu Y.X., Luo S.M., Shu J.W., Survey of secure cloud storage system and key technologies, Journal of Computer Research and Development, 50, 1, pp. 136-145, (2013)
  • [10] Xu J., Chang E.C., Zhou J.Y., Weak leakage-resilient client-side deduplication of encrypted data in cloud storage, Proc. of the 8th ACM SIGSAC Symp. on Information, Computer and Communications Security, pp. 195-206, (2013)