Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in Cloud Storage

被引:1
|
作者
Tang, Xin [1 ]
Jin, Luchao [1 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext deduplication; cloud storage; brute-force attack; collusion attack; existence privacy; ATTACKS; EFFICIENT; SCHEME;
D O I
10.1109/CLOUD62652.2024.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext deduplication is an emerging technique to eliminate redundancy in cloud storage with data confidentiality guaranteed. However, the encryption key has to be synchronized among different owners of the same data, which in turn makes the existing deduplication schemes suffer from security problems such as brute-force attacks and the collusion attack. In order to deal with them in a lightweight way, we propose a data splitting based double layer encryption for secure ciphertext deduplication in cloud storage, which is the first work to solve the problem of privacy exposure at a fundamental level. Specifically, we propose a bloom filter based data splitting method and a double layer encryption based deduplication framework. Because of the high collisional property of the feature extraction method, the same content could be extracted from similar data with a great probability. By encrypting it with a shared key, and the remaining part with the secret key of the uploader, the existence privacy is well protected during the process of ciphertext deduplication as a result. According to the experimental results compared with the state-of-the art, the communication and storage overhead can be reduced over 82.28% and 5.55% under the proposed scheme, which shows that secure ciphertext deduplication can be achieved in a lightweight way.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
  • [31] Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space
    Jayapandian, N.
    Rahman, Md Zubair A. M. J.
    BRAZILIAN ARCHIVES OF BIOLOGY AND TECHNOLOGY, 2018, 61
  • [32] Hybrid Secure Cloud Storage data based on improved Encryption Scheme
    Deepthi, B.
    Ramani, G.
    Deepika, R.
    Shabbeer, Md
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 776 - 779
  • [33] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Singh, Abhishek Kumar
    Alphonse, P. J. A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 102 - 120
  • [34] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    Abhishek Kumar Singh
    P. J. A. Alphonse
    Peer-to-Peer Networking and Applications, 2021, 14 : 102 - 120
  • [35] Secure proof of storage with deduplication for cloud storage systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    Yun, Joobeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19363 - 19378
  • [36] Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage
    Qi, Saiyu
    Wei, Wei
    Wang, Jianfeng
    Sun, Shifeng
    Rutkowski, Leszek
    Huang, Tingwen
    Kacprzyk, Janusz
    Qi, Yong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2566 - 2582
  • [37] Secure proof of storage with deduplication for cloud storage systems
    Youngjoo Shin
    Dongyoung Koo
    Junbeom Hur
    Joobeom Yun
    Multimedia Tools and Applications, 2017, 76 : 19363 - 19378
  • [38] Integrating encryption techniques for secure data storage in the cloud
    Seth, Bijeta
    Dalal, Surjeet
    Jaglan, Vivek
    Dac-Nhuong Le
    Mohan, Senthilkumar
    Srivastava, Gautam
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [39] Secure Enterprise Data Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 367 - 374
  • [40] Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage
    Zhao, Zhiyuan
    Sun, Lei
    Li, Zuohui
    Liu, Ying
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 35 - 41