Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things

被引:4
|
作者
Mi, Bo [1 ]
Li, Yang [1 ]
Darong, Huang [1 ]
Wei, Tiancheng [1 ]
Zou, Qianqian [2 ]
机构
[1] Chongqing Jiaotong Univ, Coll Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Servers; Cloud computing; Data privacy; Encryption; Internet of Things; Cloud; secure data de-duplication; threshold blind signature; Bloom filter; ALGORITHM;
D O I
10.1109/ACCESS.2020.3023750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security concerns. Though intensive researches have been addressed on a convergent cryptosystem for secure data de-duplication, the conflicts amongst functionality, confidentiality, and authority remain unbalanced. More concretely, although data are obfuscated under convergent encryption, a violent dictionary attack is still efficacious since the whole pseudorandom process relies heavily on plaintexts. As for data ownership, the download privilege, which depends on hash value, may also be infringed due to the same reason. To dispose of these problems, we presented a conspiracy-free data de-duplication protocol based on a threshold blind signature in this article. With the help of multiple key servers, the outsourced file and de-duplication label will be computationally indistinguishable from random strings. We used the Boom filter as a tool to implement a proof of ownership, ensuring that the ownership claims made by users are real. It effectively prevents the attacker from using the stolen tag to get the whole file to gain file access without authorization. The most significant innovation of this article is to use homomorphism computation to aggregate and generate partial signature tags, and to introduce a secret sharing mechanism based on The Chinese Remainder Theorem to hide signature keys, thus balancing the security concerns of cloud and client. Compared with existing schemes, both communication and computation performances are preferable in our protocol. As far as we know, our scheme is the only data de-duplication scheme that satisfies the semantic security of ciphertext and label.
引用
收藏
页码:167113 / 167122
页数:10
相关论文
共 50 条
  • [31] Research on fast de-duplication of text backup information in library database based on big data
    Ji L.
    International Journal of Information and Communication Technology, 2021, 19 (01) : 76 - 92
  • [32] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Maryam Ataei Nezhad
    Hamid Barati
    Ali Barati
    Journal of Grid Computing, 2022, 20
  • [33] Blockchain-based secure data transmission for internet of underwater things
    Razzaq, Abdul
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 4495 - 4514
  • [34] A DES-Based Mechanism to Secure Personal Data on the Internet of Things
    Chandi, Pragya
    Sharma, Atul
    Chhabra, Amandeep
    Gupta, Piyush
    ICCCE 2018, 2019, 500 : 45 - 53
  • [35] A Novel Trust-Based Secure Data Aggregation for Internet of Things
    Liu, Yanbing
    Gong, Xuehong
    Xing, Congcong
    2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 435 - 439
  • [36] Blockchain-based secure data transmission for internet of underwater things
    Abdul Razzaq
    Cluster Computing, 2022, 25 : 4495 - 4514
  • [37] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Ataei Nezhad, Maryam
    Barati, Hamid
    Barati, Ali
    JOURNAL OF GRID COMPUTING, 2022, 20 (03)
  • [38] Design and Evaluation of a Bloom Filter Based Hierarchical Hybrid Mobility Management Scheme for Internet of Things
    Bae, Ihn-Han
    MOBILE AND WIRELESS TECHNOLOGY 2018, ICMWT 2018, 2019, 513 : 3 - 15
  • [39] Autonomous Internet of Things (IoT) Data Reduction Based on Adaptive Threshold
    Zhang, Handuo
    Na, Jun
    Zhang, Bin
    SENSORS, 2023, 23 (23)
  • [40] Parity Data De-Duplication in All Flash Array-Based OpenStack Cloud Block Storage
    Heo, Huiseong
    Ahn, Cheongjin
    Kim, Deok-Hwan
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (05): : 1384 - 1387