Big Data Cloud Deduplication based on Verifiable Hash Convergent Group Signcryption

被引:2
|
作者
Cho, Ei Mon [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Saitama Univ, Grad Sch Sci & Engn, Sakura Ku, 255 Shimookubo, Saitama 3388570, Japan
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Shinjuku Ku, Nishi Waseda 1-6-1, Tokyo 1698050, Japan
关键词
D O I
10.1109/BigDataService.2017.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Big Data cloud storage servers are becoming popular the shortage of disk space in the cloud becomes a problem. Data deduplication is a method to control the explosion growth of data on the cloud and most of the storage providers are finding more secure and efficient methods for their sensitive data. Recently, an interesting technique called signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented, with better performance than the traditional signature-then-encryption approach. According to the deduplication, we introduce a new method for a group of users that can eliminate redundant encrypted data owned by different users. Furthermore, we generate the tag which will be the key component of big data management. We propose a new primitive group signcryption for deduplication called verifiable hash convergent group signcryption (VHCGS) by adding the properties of group signcryption and the verification facilities for the storage server (third party).
引用
收藏
页码:265 / 270
页数:6
相关论文
共 50 条
  • [1] Secure SMS Transmission based on Verifiable Hash Convergent Group Signcryption
    Cho, Ei Mon
    Koshiba, Takeshi
    [J]. 2017 18TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (IEEE MDM 2017), 2017, : 332 - 335
  • [2] A Big Data Deduplication Using HECC Based Encryption With Modified Hash Value in Cloud
    Shrivastava, Ankit
    Tiwary, Abhigyan
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 484 - 489
  • [3] A Verifiable Data Deduplication Scheme in Cloud Computing
    Wen, Zhaocong
    Luo, Jinman
    Chen, Huajun
    Meng, Jiaxiao
    Li, Xuan
    Li, Jin
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 85 - 88
  • [4] Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing
    Kibiwott, Kittur Philemon
    Zhao, Yanan
    Kogo, Julius
    Zhang, Fengli
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3561 - 3594
  • [5] Verifiable Secure Data Deduplication Method in Cloud Storage
    可验证的云存储安全数据删重方法
    [J]. Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31):
  • [6] Deduplication on Encrypted Big Data in Cloud
    Yan, Zheng
    Ding, Wenxiu
    Yu, Xixun
    Zhu, Haiqi
    Deng, Robert H.
    [J]. IEEE Transactions on Big Data, 2016, 2 (02): : 138 - 150
  • [7] A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud
    Chen, Fei
    Xiang, Tao
    Chen, Jianyong
    Yu, Wei
    Fu, Xinwen
    Zhang, Shengyu
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, 2015, : 219 - 226
  • [8] Merkle Hash Tree based Deduplication in Cloud Storage
    Li, Chaoling
    Chen, Yue
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
  • [9] Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
    Liu, Xueyan
    Lu, Tingting
    He, Xiaomei
    Yang, Xiaotao
    Niu, Shufen
    [J]. IEEE ACCESS, 2020, 8 (08): : 52062 - 52074
  • [10] VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof
    Yu, Xixun
    Bai, Hui
    Yan, Zheng
    Zhang, Rui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 680 - 694