An Encrypted File Deduplication Scheme with Permission in Cloud Storage

被引:0
|
作者
Deng, Zuojie [1 ]
Tan, Xiaolan [1 ]
Chen, Shuhong [2 ]
机构
[1] Hunan Inst Engn, Sch Comp & Commun, Xiangtan 411104, Hunan, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2018/6091807
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Encrypted file deduplication scheme (EFD) can improve its storage space utilization of cloud storage and protect the privacy of files in cloud storage. However, if an enterprise stores its files to cloud storage that has deployed an encrypted file deduplication scheme that does not support permission checking, this will destroy the permission of the enterprise files and bring some security problems. This seriously affects the practical value of EFD and prevents it from deploying in concrete cloud storage. To resolve this problem, we propose an encrypted file deduplication scheme with permission (EFDSP) and construct the EFDSP by using the hidden vector encryption (HVE). We have analyzed the security of EFDSP. The results have shown that EFDSP is secure and it can prevent the online deduplication oracle attack. We implement EFDSP and conduct the performance evaluation. The results show that the performance of EFDSP is little inferior to that of SADS, which is the only existing encrypted file deduplication scheme with permission, but the performance gap decreases with the increasing number of the authorized users and EFDSP has overcome the security weakness of SADS.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Distributed Storage Hash Algorithm (DSHA) for File-Based Deduplication in Cloud Computing
    Hema, S.
    Kangaiammal, A.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 572 - 581
  • [42] Survey on techniques for Authorized Deduplication of Encrypted data in Cloud
    Waghmare, Milind B.
    Padwekar, Suhasini, V
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 553 - +
  • [43] Game Theoretical Analysis on Encrypted Cloud Data Deduplication
    Liang, Xueqin
    Yan, Zheng
    Chen, Xiaofeng
    Yang, Laurence T.
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) : 5778 - 5789
  • [44] Toward Encrypted Cloud Media Center With Secure Deduplication
    Zheng, Yifeng
    Yuan, Xingliang
    Wang, Xinyu
    Jiang, Jinghua
    Wang, Cong
    Gui, Xiaolin
    IEEE TRANSACTIONS ON MULTIMEDIA, 2017, 19 (02) : 251 - 265
  • [45] Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Xiang, Tao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3545 - 3561
  • [46] Encrypted deduplication scheme with access control and key updates
    Ha G.
    Jia Q.-W.
    Chen H.
    Jia C.
    Liu H.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (06): : 195 - 206
  • [47] EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems
    Chen, Yuxiang
    Dong, Guishan
    Xu, Chunxiang
    Hao, Yao
    Zhao, Yue
    SENSORS, 2023, 23 (20)
  • [48] A blockchain-based auditable deduplication scheme for multi-cloud storage
    Jin, Chunhua
    Xu, Yongliang
    Qin, Wenyu
    Zhao, Jie
    Kan, Ge
    Zeng, Fugeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (05) : 2870 - 2883
  • [49] One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage
    Liu, Xuefeng
    Sun, Wenhai
    Lou, Wenjing
    Pei, Qingqi
    Zhang, Yuqing
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [50] SAFE: Structure-Aware File and Email Deduplication for Cloud-based Storage Systems
    Kim, Daehee
    Song, Sejun
    Choi, Baek-Young
    PROCEEDINGS OF THE 2013 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2013, : 130 - 137