Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things

被引:4
|
作者
Mi, Bo [1 ]
Li, Yang [1 ]
Darong, Huang [1 ]
Wei, Tiancheng [1 ]
Zou, Qianqian [2 ]
机构
[1] Chongqing Jiaotong Univ, Coll Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Servers; Cloud computing; Data privacy; Encryption; Internet of Things; Cloud; secure data de-duplication; threshold blind signature; Bloom filter; ALGORITHM;
D O I
10.1109/ACCESS.2020.3023750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security concerns. Though intensive researches have been addressed on a convergent cryptosystem for secure data de-duplication, the conflicts amongst functionality, confidentiality, and authority remain unbalanced. More concretely, although data are obfuscated under convergent encryption, a violent dictionary attack is still efficacious since the whole pseudorandom process relies heavily on plaintexts. As for data ownership, the download privilege, which depends on hash value, may also be infringed due to the same reason. To dispose of these problems, we presented a conspiracy-free data de-duplication protocol based on a threshold blind signature in this article. With the help of multiple key servers, the outsourced file and de-duplication label will be computationally indistinguishable from random strings. We used the Boom filter as a tool to implement a proof of ownership, ensuring that the ownership claims made by users are real. It effectively prevents the attacker from using the stolen tag to get the whole file to gain file access without authorization. The most significant innovation of this article is to use homomorphism computation to aggregate and generate partial signature tags, and to introduce a secret sharing mechanism based on The Chinese Remainder Theorem to hide signature keys, thus balancing the security concerns of cloud and client. Compared with existing schemes, both communication and computation performances are preferable in our protocol. As far as we know, our scheme is the only data de-duplication scheme that satisfies the semantic security of ciphertext and label.
引用
收藏
页码:167113 / 167122
页数:10
相关论文
共 50 条
  • [21] An Undirected Graph Traversal based Grouping Prediction Method for Data De-duplication
    Wang, Longxiang
    Zhang, Xingjun
    Zhu, Guofeng
    Zhu, Yueguang
    Dong, Xiaoshe
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 3 - 8
  • [22] Object-based data de-duplication method for OpenXML compound files
    School of Computer Science & Technology, Beijing Institute of Technology, Beijing
    100086, China
    不详
    101149, China
    Jisuanji Yanjiu yu Fazhan, 7 (1546-1557):
  • [23] Attribute-based storage control with smart De-duplication filter using hybrid cloud
    Bhosale, Amarja Hanumant
    Manjrekar, A. A.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [24] Secure and Privacy-Preserving Report De-duplication in the Fog-Based Vehicular Crowdsensing System
    Jiang, Shunrong
    Liu, Jianqing
    Duan, Mengjie
    Wang, Liangmin
    Fang, Yuguang
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [25] An Effective RAID Data Layout for Object-Based De-duplication Backup System
    Yan Fang
    Tan Yu'an
    Zhang Quanxin
    Wu Fei
    Cheng Zijing
    Zheng Jun
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 832 - 840
  • [26] An Effective RAID Data Layout for Object-Based De-duplication Backup System
    YAN Fang
    TAN Yu'an
    ZHANG Quanxin
    WU Fei
    CHENG Zijing
    ZHENG Jun
    ChineseJournalofElectronics, 2016, 25 (05) : 832 - 840
  • [27] Secure Data Management in Internet-of-Things Based on Blockchain
    Thakker, Jenil
    Chang, Ikwhan
    Park, Younghee
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 190 - 194
  • [28] Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things using Bloom Filter
    Maurya, Anup Kumar
    Sastry, V. N.
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 173 - 180
  • [29] 3DNBS: A Data De-duplication Disk-based Network Backup System
    Yang, Tianming
    Feng, Dan
    Liu, Jingning
    Wan, Yaping
    Niu, Zhongying
    Ke, Yuchang
    NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 287 - 294
  • [30] Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things
    Qiao, Zirui
    Zhou, Yanwei
    Yang, Bo
    Zhang, Mingwu
    Wang, Tao
    Xia, Zhe
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4719 - 4730