Randomized deduplication with ownership management and data sharing in cloud storage

被引:17
|
作者
Tian, Guohua [1 ]
Ma, Hua [2 ]
Xie, Ying [2 ]
Liu, Zhenhua [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
基金
中国国家自然科学基金;
关键词
Data deduplication; Ownership management; Dynamic key-encrypting key tree; Data sharing;
D O I
10.1016/j.jisa.2019.102432
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In commercial cloud services, the client-side deduplication is widely used to save the system resource of servers. However, this kind of deduplication technique is vulnerable to the collusive authentication attack, brute-force attack and duplicate-faking attack. Most existing schemes cannot resolve those problems efficiently. Besides, how to realize the ownership management in client-side deduplication to ensure the forward and backward secrecy of outsourced data is also a hot issue. In this paper, we propose a randomized client-side deduplication scheme, which uses a randomized deduplication protocol to prevent the collusive authentication attack and offline brute-force attack launched by the outside adversaries, and stores each data according to two file tags to resist duplicate-faking attack. In addition, we realize a more available ownership management and data sharing with the aid of dynamic Key-Encrypting Key tree. Security and performance analysis show that the proposed scheme can achieve the desired security requirements while saving the system resource efficiently. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Boafft: Distributed Deduplication for Big Data Storage in the Cloud
    Luo, Shengmei
    Zhang, Guangyan
    Wu, Chengwen
    Khan, Samee U.
    Li, Keqin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1199 - 1211
  • [32] Encrypted Data Management with Deduplication in Cloud Computing
    Yan, Zheng
    Wang, Mingjun
    Li, Yuxiang
    Vasilakos, Athanasios V.
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (02): : 28 - 35
  • [33] A Data Structure for Efficient File Deduplication in Cloud Storage
    Wang, Bohui
    Li, Hui
    Zhao, Yan
    Yang, Xin
    Ma, Huajun
    Xie, Xin
    Xing, Kaixuan
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 71 - 77
  • [34] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    [J]. Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470
  • [35] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Jianli Bai
    Jia Yu
    Xiang Gao
    [J]. Soft Computing, 2020, 24 : 12197 - 12214
  • [36] Group provable data possession with deduplication in cloud storage
    Wang H.-Y.
    Zhu L.-H.
    Li L.-Y.-J.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1417 - 1431
  • [37] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Bai, Jianli
    Yu, Jia
    Gao, Xiang
    [J]. SOFT COMPUTING, 2020, 24 (16) : 12197 - 12214
  • [38] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543
  • [39] Secure Data Deduplication System with Tag Consistency in Cloud Data Storage
    Patil, Pramod Gorakh
    Dixit, Aditya Rajesh
    Sharma, Aman
    Mahale, Prashant Rajendra
    Jadhav, Mayur Pundlik
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 119 - 124
  • [40] Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Koo, Dongyoung
    Hur, Junbeom
    [J]. 2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 391 - 398