Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in Cloud Storage

被引:1
|
作者
Tang, Xin [1 ]
Jin, Luchao [1 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext deduplication; cloud storage; brute-force attack; collusion attack; existence privacy; ATTACKS; EFFICIENT; SCHEME;
D O I
10.1109/CLOUD62652.2024.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext deduplication is an emerging technique to eliminate redundancy in cloud storage with data confidentiality guaranteed. However, the encryption key has to be synchronized among different owners of the same data, which in turn makes the existing deduplication schemes suffer from security problems such as brute-force attacks and the collusion attack. In order to deal with them in a lightweight way, we propose a data splitting based double layer encryption for secure ciphertext deduplication in cloud storage, which is the first work to solve the problem of privacy exposure at a fundamental level. Specifically, we propose a bloom filter based data splitting method and a double layer encryption based deduplication framework. Because of the high collisional property of the feature extraction method, the same content could be extracted from similar data with a great probability. By encrypting it with a shared key, and the remaining part with the secret key of the uploader, the existence privacy is well protected during the process of ciphertext deduplication as a result. According to the experimental results compared with the state-of-the art, the communication and storage overhead can be reduced over 82.28% and 5.55% under the proposed scheme, which shows that secure ciphertext deduplication can be achieved in a lightweight way.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
  • [1] Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
    Tang, Heyi
    Cui, Yong
    Guan, Chaowen
    Wu, Jianping
    Weng, Jian
    Ren, Kui
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 59 - 70
  • [2] Secure and Efficient Cloud Ciphertext Deduplication Based on SGX
    Li, Limin
    Qin, Guiyun
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 696 - 703
  • [3] A hybrid encryption for secure data deduplication the cloud
    Ebinazer S.E.
    Savarimuthu N.
    Bhanu S.M.S.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 295 - 307
  • [4] ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
    Ebinazer, Silambarasan Elkana
    Savarimuthu, Nickolas
    Bhanu, S. Mary Saira
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3309 - 3325
  • [5] ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
    Silambarasan Elkana Ebinazer
    Nickolas Savarimuthu
    S. Mary Saira Bhanu
    Wireless Personal Communications, 2021, 117 : 3309 - 3325
  • [6] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [7] Secure Cloud Data Deduplication with Efficient Re-Encryption
    Yuan, Haoran
    Chen, Xiaofeng
    Li, Jin
    Jiang, Tao
    Wang, Jianfeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 442 - 456
  • [8] Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage
    Shin, Youngjoo
    Koo, Dongyoung
    Yun, Joobeom
    Hur, Junbeom
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1021 - 1033
  • [9] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [10] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470