Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in Cloud Storage

被引:1
|
作者
Tang, Xin [1 ]
Jin, Luchao [1 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext deduplication; cloud storage; brute-force attack; collusion attack; existence privacy; ATTACKS; EFFICIENT; SCHEME;
D O I
10.1109/CLOUD62652.2024.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext deduplication is an emerging technique to eliminate redundancy in cloud storage with data confidentiality guaranteed. However, the encryption key has to be synchronized among different owners of the same data, which in turn makes the existing deduplication schemes suffer from security problems such as brute-force attacks and the collusion attack. In order to deal with them in a lightweight way, we propose a data splitting based double layer encryption for secure ciphertext deduplication in cloud storage, which is the first work to solve the problem of privacy exposure at a fundamental level. Specifically, we propose a bloom filter based data splitting method and a double layer encryption based deduplication framework. Because of the high collisional property of the feature extraction method, the same content could be extracted from similar data with a great probability. By encrypting it with a shared key, and the remaining part with the secret key of the uploader, the existence privacy is well protected during the process of ciphertext deduplication as a result. According to the experimental results compared with the state-of-the art, the communication and storage overhead can be reduced over 82.28% and 5.55% under the proposed scheme, which shows that secure ciphertext deduplication can be achieved in a lightweight way.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
  • [21] A Review on Secure Data Deduplication: Cloud Storage Security Issue
    Prajapati, Priteshkumar
    Shah, Parth
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 3996 - 4007
  • [22] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [23] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [24] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    Cluster Computing, 2024, 27 : 2203 - 2215
  • [25] A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [26] Secure Deduplication on Public Cloud Storage
    Graupner, Hendrik
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Meinel, Christoph
    ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 34 - 41
  • [27] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [28] Secure Image Deduplication in Cloud Storage
    Gang, Han
    Yan, Hongyang
    Xu, Lingling
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 243 - 251
  • [29] Secure deduplication for multimedia data with user revocation in cloud storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5889 - 5903
  • [30] A Cloud Data Deduplication Method Based on Double-Layered Encryption and Key Sharing
    Gao, Wen-Jing
    Xian, He-Qun
    Cheng, Run-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (11): : 2203 - 2215