Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in Cloud Storage

被引:1
|
作者
Tang, Xin [1 ]
Jin, Luchao [1 ]
机构
[1] Univ Int Relat, Sch Cyber Sci & Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext deduplication; cloud storage; brute-force attack; collusion attack; existence privacy; ATTACKS; EFFICIENT; SCHEME;
D O I
10.1109/CLOUD62652.2024.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext deduplication is an emerging technique to eliminate redundancy in cloud storage with data confidentiality guaranteed. However, the encryption key has to be synchronized among different owners of the same data, which in turn makes the existing deduplication schemes suffer from security problems such as brute-force attacks and the collusion attack. In order to deal with them in a lightweight way, we propose a data splitting based double layer encryption for secure ciphertext deduplication in cloud storage, which is the first work to solve the problem of privacy exposure at a fundamental level. Specifically, we propose a bloom filter based data splitting method and a double layer encryption based deduplication framework. Because of the high collisional property of the feature extraction method, the same content could be extracted from similar data with a great probability. By encrypting it with a shared key, and the remaining part with the secret key of the uploader, the existence privacy is well protected during the process of ciphertext deduplication as a result. According to the experimental results compared with the state-of-the art, the communication and storage overhead can be reduced over 82.28% and 5.55% under the proposed scheme, which shows that secure ciphertext deduplication can be achieved in a lightweight way.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
  • [41] What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage
    You, Weijing
    Lei, Lei
    Chen, Bo
    Liu, Limin
    INFORMATION, 2021, 12 (04)
  • [42] FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
    Jiang, Tao
    Yuan, Xu
    Chen, Yuan
    Cheng, Ke
    Wang, Liangmin
    Chen, Xiaofeng
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2466 - 2483
  • [43] A Secure Hierarchical Deduplication System in Cloud Storage
    Yao, Xin
    Lin, Yaping
    Liu, Qin
    Zhang, Yanchao
    2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [44] Cloud Storage: A Review on Secure Deduplication and Issues
    Joice, S. Annie
    Mohamed, M. A. Maluk
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (03): : 861 - 873
  • [45] Advanced chunk-based data deduplication framework for secure data storage in cloud using hybrid heuristic assisted optimal key-based encryption
    Ruba, S.
    Kalpana, A. M.
    WIRELESS NETWORKS, 2025, : 3467 - 3489
  • [46] LSDedup: Layered Secure Deduplication for Cloud Storage
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Huang, Hejiao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (02) : 422 - 435
  • [47] Efficient and Secure File Deduplication in Cloud Storage
    Shin, Youngjoo
    Kim, Kwangjo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 184 - 197
  • [48] Attribute-Based Convergent Encryption Key Management for Secure Deduplication in Cloud
    Silambarasan, E.
    Nickolas, S.
    Bhanu, S. Mary Saira
    ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 537 - 551
  • [49] Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption
    Gong, Bei
    Guo, Chong
    Liu, Yi-Jing
    Wang, Qian
    IEEE NETWORK, 2023, 37 (06): : 42 - 49
  • [50] Enhanced Convergent Encryption Key Generation for Secured Data Deduplication in Cloud Storage
    Uma, G.
    Jayasimman, L.
    SECOND NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2018), 2018, 1142