Secure Encrypted Data With Authorized Deduplication in Cloud

被引:18
|
作者
Xiong, Jinbo [1 ]
Zhang, Yuanyuan [2 ,3 ]
Tang, Shaohua [2 ,3 ]
Liu, Ximeng [4 ]
Yao, Zhiqiang [1 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[2] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Role re-encryption; role authorized tree; privacy leakage; authorized deduplication; proof of ownership; ACCESS-CONTROL; OWNERSHIP; EFFICIENT;
D O I
10.1109/ACCESS.2019.2920998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and satisfies the dynamic privilege updating and revoking. Meanwhile, our system supports ownership checking and achieves the proof of ownership for the authorized users efficiently. Specifically, we introduce a management center to handle with the authorized request and establish a role authorized tree (RAT) mapping the relationship of the roles and keys. With the convergent encryption algorithm and the role re-encryption technique, it can be guaranteed that only the authorized user who has the corresponding role re-encryption key can access the specific file without any data leakage. Through role re-encryption key updating and revoking, our system achieves the dynamic updating of the authorized user's privilege. Furthermore, we exploit the dynamic count filters (DCF) to implement the data updating and improve the retrieval of ownership verifying effectively. We conduct the security analysis and the simulation experiment to demonstrate the security and efficiency of our proposed system.
引用
收藏
页码:75090 / 75104
页数:15
相关论文
共 50 条
  • [41] Secure and Efficient Cloud Data Deduplication with Ownership Management
    Jiang, Shunrong
    Jiang, Tao
    Wang, Liangmin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1152 - 1165
  • [42] DOAS: Efficient data owner authorized search over encrypted cloud data
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Zhiquan
    Zhang, Junwei
    Wei, Fushan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 349 - 360
  • [43] DOAS: Efficient data owner authorized search over encrypted cloud data
    Yinbin Miao
    Jianfeng Ma
    Ximeng Liu
    Zhiquan Liu
    Junwei Zhang
    Fushan Wei
    Peer-to-Peer Networking and Applications, 2018, 11 : 349 - 360
  • [44] Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory
    Liang, Xueqin
    Yan, Zheng
    Deng, Robert H.
    Zheng, Qinghua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 587 - 600
  • [45] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [46] Enabling Secure Deduplication in Encrypted Decentralized Storage
    Zhang, Bo
    Cui, Helei
    Chen, Yaxing
    Liu, Xiaoning
    Yu, Zhiwen
    Guo, Bin
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 459 - 475
  • [47] Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
    Sultan, Nazatul Haque
    Kaaniche, Nesrine
    Laurent, Maryline
    Barbhuiya, Ferdous Ahmed
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 216 - 233
  • [48] Secure Data Deduplication System with Tag Consistency in Cloud Data Storage
    Patil, Pramod Gorakh
    Dixit, Aditya Rajesh
    Sharma, Aman
    Mahale, Prashant Rajendra
    Jadhav, Mayur Pundlik
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 119 - 124
  • [49] Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
    Hur, Junbeom
    Koo, Dongyoung
    Shin, Youngjoo
    Kang, Kyungtae
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 3113 - 3125
  • [50] To Develop Secure Deduplication of Data Using Hybrid Cloud Methodology
    Motegaonkar, Sonali B.
    Kulkarni, Chaitanya S.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1759 - 1762