Key-exposure resilient integrity auditing scheme with encrypted data deduplication

被引:0
|
作者
Zhang X. [1 ]
Li C. [2 ]
Liu Z. [2 ]
机构
[1] School of Science, Xi'an Technological University, Xi'an
[2] School of Mathematics and Statistics, Xidian University, Xi'an
来源
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Client-side deduplication; Cloud storage; Encrypted data; Integrity auditing; Key-exposure resilient;
D O I
10.11959/j.issn.1000-436x.2019076
中图分类号
学科分类号
摘要
For the problems of key-exposure, encrypted data duplication and integrity auditing in cloud data storage, a public auditing scheme was proposed to support key update and encrypted data deduplication. Utilizing Bloom filters, the proposed scheme could achieve client-side deduplication, and guaranteed that the key exposure in one time period didn't effect the users’ private key in other time periods. The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time. Security analysis indicates that the proposed scheme is strong key-exposure resilient, confidentiality, detectability, and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:95 / 106
页数:11
相关论文
共 19 条
  • [1] Tan S., Jia Y., Han W.H., Research and development of provable data integrity in cloud storage, Chinese Journal of Computers, 38, 1, pp. 164-177, (2015)
  • [2] Wang Q., Wang C., Li J., Et al., Enabling public verifiability and data dynamics for storage security in cloud computing, The 14th European Symposium on Research in Computer Security, pp. 355-370, (2009)
  • [3] Feng D.G., Zhang M., Zhang Y., Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
  • [4] Ateniese G., Burns R., Curtmola R., Et al., Provable data possession at untrusted stores, The ACM Conference on Computer and Communications Security, pp. 598-609, (2007)
  • [5] Juels A., Kaliski B.S., Pors: proofs of retrievability for large files, The 14th ACM Conference on Computer and Communications Security, pp. 584-597, (2007)
  • [6] Xiong J.B., Zhang Y.Y., Li F.H., Et al., Research progress on secure data deduplication in cloud, Journal on Communications, 37, 11, pp. 169-180, (2016)
  • [7] Xiong J.B., Zhang Y.Y., Tian Y.L., Et al., Cloud data secure deduplication scheme via role-based symmetric encryption, Journal on Communications, 39, 5, pp. 59-73, (2018)
  • [8] Guo X.Y., Fu A.M., Kuang B.Y., Et al., Secure deduplication and integrity audit system based on convergent encryption for cloud storage, Journal on Communications, 38, Z2, pp. 156-163, (2017)
  • [9] Xiong J.B., Li S.P., Zhang Y.Y., Et al., PoSW: novel secure deduplication scheme for collaborative cloud applications, Journal on Communications, 38, 7, pp. 18-27, (2017)
  • [10] Yang C., Ji Q., Xiong S.C., Et al., New method for file deduplication in cloud storage, Journal on Communications, 38, 3, pp. 25-33, (2017)