Secure cloud storage with anonymous deduplication using ID-based key management

被引:3
|
作者
Gharib, Mohammed [1 ]
Fazli, MohammadAmin [2 ]
机构
[1] Inst Res Fundamental Sci, Tehran, Iran
[2] Sharif Univ Technol, Tehran, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 02期
关键词
Cloud storage; Deduplication; Anonymity;
D O I
10.1007/s11227-022-04751-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage systems have been turned into the primary services of Internet users nowadays. While the application of such systems is exponentially increasing, deduplication algorithms help face scalability issues. Although source-side deduplication optimizes both storage and bandwidth, the main concern that deduplication algorithms suffer from is still data confidentiality. Message-locked encryption (MLE) is a well-known key management framework for secure deduplication to provide confidentiality. This framework is the basis of almost all the proposed secure deduplication solutions. Even though there are lots of literature works trying to provide secure deduplication algorithms, to the best of our knowledge, none of them provide an effective anonymity service for data owners. In this paper, we propose an N-anonymity algorithm to provide an effective anonymity service, capable of prohibiting even the cloud storage provider from knowing which users are storing the same data. The algorithm is analytically studied, and the results are validated by exhaustive implementations using real data. Furthermore, we propose an ID-based key management algorithm as the cornerstone of the secure cloud storage system. The proposed algorithm, which could be considered as an asymmetric extension of MLE, is easy to implement and compatible with the existed cloud architectures as well as the proposed anonymity-based deduplication system.
引用
收藏
页码:2356 / 2382
页数:27
相关论文
共 50 条
  • [1] Secure cloud storage with anonymous deduplication using ID-based key management
    Mohammed Gharib
    MohammadAmin Fazli
    The Journal of Supercomputing, 2023, 79 : 2356 - 2382
  • [2] ID-Based Cryptography for Secure Cloud Data Storage
    Kaaniche, Nesrine
    Boudguiga, Aymen
    Laurent, Maryline
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 375 - 382
  • [3] Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Koo, Dongyoung
    Hur, Junbeom
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 391 - 398
  • [4] A key-sharing based secure deduplication scheme in cloud storage
    Wang, Liang
    Wang, Baocang
    Song, Wei
    Zhang, Zhili
    INFORMATION SCIENCES, 2019, 504 : 48 - 60
  • [5] A Proposal of Key Management Scheme and Its Operation Using Anonymous Biometrics on ID-based Infrastructure
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 83 - 94
  • [6] An improved anonymous ID-based key issuing protocol
    Cai, Yongquan
    Yan, Xiang
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 472 - +
  • [7] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [8] Tightly Secure ID-based Authenticated Key Exchange
    Mita, Takumu
    Yoneyama, Kazuki
    PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, : 42 - 53
  • [9] Anonymous ID-based group key agreement for wireless networks
    Wan, Zhiguo
    Ren, Kui
    Lou, Wenjing
    Preneel, Bart
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2615 - +
  • [10] Secure key issuing scheme in ID-based cryptography with revocable ID
    Tanwar, Sarvesh
    Kumar, Anil
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 676 - 685