Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things

被引:4
|
作者
Mi, Bo [1 ]
Li, Yang [1 ]
Darong, Huang [1 ]
Wei, Tiancheng [1 ]
Zou, Qianqian [2 ]
机构
[1] Chongqing Jiaotong Univ, Coll Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Servers; Cloud computing; Data privacy; Encryption; Internet of Things; Cloud; secure data de-duplication; threshold blind signature; Bloom filter; ALGORITHM;
D O I
10.1109/ACCESS.2020.3023750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security concerns. Though intensive researches have been addressed on a convergent cryptosystem for secure data de-duplication, the conflicts amongst functionality, confidentiality, and authority remain unbalanced. More concretely, although data are obfuscated under convergent encryption, a violent dictionary attack is still efficacious since the whole pseudorandom process relies heavily on plaintexts. As for data ownership, the download privilege, which depends on hash value, may also be infringed due to the same reason. To dispose of these problems, we presented a conspiracy-free data de-duplication protocol based on a threshold blind signature in this article. With the help of multiple key servers, the outsourced file and de-duplication label will be computationally indistinguishable from random strings. We used the Boom filter as a tool to implement a proof of ownership, ensuring that the ownership claims made by users are real. It effectively prevents the attacker from using the stolen tag to get the whole file to gain file access without authorization. The most significant innovation of this article is to use homomorphism computation to aggregate and generate partial signature tags, and to introduce a secret sharing mechanism based on The Chinese Remainder Theorem to hide signature keys, thus balancing the security concerns of cloud and client. Compared with existing schemes, both communication and computation performances are preferable in our protocol. As far as we know, our scheme is the only data de-duplication scheme that satisfies the semantic security of ciphertext and label.
引用
收藏
页码:167113 / 167122
页数:10
相关论文
共 50 条
  • [41] A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things
    Srivastava, Vikas
    Debnath, Sumit Kumar
    COMPUTER JOURNAL, 2023, 66 (10): : 2499 - 2516
  • [42] A secure and extensible blockchain-based data provenance framework for the Internet of Things
    Sigwart, Marten
    Borkowski, Michael
    Peise, Marco
    Schulte, Stefan
    Tai, Stefan
    PERSONAL AND UBIQUITOUS COMPUTING, 2020, 28 (1) : 309 - 323
  • [43] A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things
    Chi, Jiancheng
    Li, Yu
    Huang, Jing
    Liu, Jing
    Jin, Yingwei
    Chen, Chen
    Qiu, Tie
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167 (167)
  • [44] Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology
    Umran, Samir M.
    Lu, Songfeng
    Abduljabbar, Zaid Ameen
    Zhu, Jianxin
    Wu, Junjun
    APPLIED SCIENCES-BASEL, 2021, 11 (14):
  • [45] A secure and extensible blockchain-based data provenance framework for the Internet of Things
    Marten Sigwart
    Michael Borkowski
    Marco Peise
    Stefan Schulte
    Stefan Tai
    Personal and Ubiquitous Computing, 2024, 28 : 309 - 323
  • [46] An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
    Chen, Xingxing
    Cheng, Qingfeng
    Yang, Weidong
    Luo, Xiangyang
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (03)
  • [47] Federated deep reinforcement learning based secure data sharing for Internet of Things
    Miao, Qinyang
    Lin, Hui
    Wang, Xiaoding
    Hassan, Mohammad Mehedi
    COMPUTER NETWORKS, 2021, 197
  • [48] A dynamic trust based clustering method for secure data gathering in Internet of Things
    Naghibi, Maryam
    Barati, Hamid
    Barati, Ali
    COMPUTING, 2025, 107 (04)
  • [49] Privacy Preserving Data Provenance Model Based on PUF for Secure Internet of Things
    Hamadeh, Hala
    Tyagi, Akhilesh
    2019 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2019), 2019, : 189 - 194
  • [50] Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
    Tran Viet Xuan Phuong
    Ning, Rui
    Xin, Chunsheng
    Wu, Hongyi
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1511 - 1519