Secure Encrypted Data With Authorized Deduplication in Cloud

被引:18
|
作者
Xiong, Jinbo [1 ]
Zhang, Yuanyuan [2 ,3 ]
Tang, Shaohua [2 ,3 ]
Liu, Ximeng [4 ]
Yao, Zhiqiang [1 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[2] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Role re-encryption; role authorized tree; privacy leakage; authorized deduplication; proof of ownership; ACCESS-CONTROL; OWNERSHIP; EFFICIENT;
D O I
10.1109/ACCESS.2019.2920998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and satisfies the dynamic privilege updating and revoking. Meanwhile, our system supports ownership checking and achieves the proof of ownership for the authorized users efficiently. Specifically, we introduce a management center to handle with the authorized request and establish a role authorized tree (RAT) mapping the relationship of the roles and keys. With the convergent encryption algorithm and the role re-encryption technique, it can be guaranteed that only the authorized user who has the corresponding role re-encryption key can access the specific file without any data leakage. Through role re-encryption key updating and revoking, our system achieves the dynamic updating of the authorized user's privilege. Furthermore, we exploit the dynamic count filters (DCF) to implement the data updating and improve the retrieval of ownership verifying effectively. We conduct the security analysis and the simulation experiment to demonstrate the security and efficiency of our proposed system.
引用
收藏
页码:75090 / 75104
页数:15
相关论文
共 50 条
  • [21] Authorized Data Deduplication Using Hybrid Cloud Technique
    Maruti, Mane Vidya
    Nighot, Mininath K.
    2015 INTERNATIONAL CONFERENCE ON ENERGY SYSTEMS AND APPLICATIONS, 2015, : 695 - 699
  • [22] Secure Enterprise Data Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 367 - 374
  • [23] Game Theoretical Analysis on Encrypted Cloud Data Deduplication
    Liang, Xueqin
    Yan, Zheng
    Chen, Xiaofeng
    Yang, Laurence T.
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) : 5778 - 5789
  • [24] A Novel Data Deduplication Scheme for Encrypted Cloud Databases
    Li, Jung-Shian
    Liu, I-Hsien
    Lee, Chao-Yuan
    Li, Chu-Fen
    Liu, Chuan-Gang
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 1115 - 1125
  • [25] Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Xiang, Tao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3545 - 3561
  • [26] SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating
    Zhang, Shuguang
    Xian, Hequn
    Li, Zengpeng
    Wang, Liming
    IEEE ACCESS, 2020, 8 : 186323 - 186334
  • [27] Secure Deduplication of Encrypted Data without Additional Independent Servers
    Liu, Jian
    Asokan, N.
    Pinkas, Benny
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 874 - 885
  • [28] Secure Encrypted Data Deduplication with Ownership Proof and User Revocation
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 297 - 312
  • [29] Secure Deduplication of Encrypted Data: Refined Model and New Constructions
    Liu, Jian
    Duan, Li
    Li, Yong
    Asokan, N.
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 374 - 393
  • [30] Secure Data Deduplication with Reliable Data Deletion in Cloud
    Meng, Wenjuan
    Ge, Jianhua
    Jiang, Tao
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 551 - 570