Secure Encrypted Data With Authorized Deduplication in Cloud

被引:18
|
作者
Xiong, Jinbo [1 ]
Zhang, Yuanyuan [2 ,3 ]
Tang, Shaohua [2 ,3 ]
Liu, Ximeng [4 ]
Yao, Zhiqiang [1 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[2] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Role re-encryption; role authorized tree; privacy leakage; authorized deduplication; proof of ownership; ACCESS-CONTROL; OWNERSHIP; EFFICIENT;
D O I
10.1109/ACCESS.2019.2920998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and satisfies the dynamic privilege updating and revoking. Meanwhile, our system supports ownership checking and achieves the proof of ownership for the authorized users efficiently. Specifically, we introduce a management center to handle with the authorized request and establish a role authorized tree (RAT) mapping the relationship of the roles and keys. With the convergent encryption algorithm and the role re-encryption technique, it can be guaranteed that only the authorized user who has the corresponding role re-encryption key can access the specific file without any data leakage. Through role re-encryption key updating and revoking, our system achieves the dynamic updating of the authorized user's privilege. Furthermore, we exploit the dynamic count filters (DCF) to implement the data updating and improve the retrieval of ownership verifying effectively. We conduct the security analysis and the simulation experiment to demonstrate the security and efficiency of our proposed system.
引用
收藏
页码:75090 / 75104
页数:15
相关论文
共 50 条
  • [31] A hybrid encryption for secure data deduplication the cloud
    Ebinazer S.E.
    Savarimuthu N.
    Bhanu S.M.S.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 295 - 307
  • [32] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [33] Anonymous Deduplication of Encrypted Data with Proof of Ownership in Cloud Storage
    Jin, Xuexue
    Wei, Lingbo
    Yu, Mengke
    Yu, Nenghai
    Sun, Jinyuan
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 224 - 229
  • [34] An implementation for secure data deduplication on end-to-end encrypted documents
    Jipianu, Tora-Mihnea
    Aciobanitei, Iulian
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 303 - 307
  • [35] SecDedup: Secure data deduplication with dynamic auditing in the cloud
    Peng, Li
    Yan, Zheng
    Liang, Xueqin
    Yu, Xixun
    INFORMATION SCIENCES, 2023, 644
  • [36] Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud
    Dinesh, N.
    Juvanna, I.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 305 - 313
  • [37] DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
    Ghassabi, Kiana
    Pahlevani, Peyman
    IEEE ACCESS, 2024, 12 : 70743 - 70758
  • [38] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543
  • [39] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [40] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470