Authorized Client-side Deduplication Using Access Policy-based Convergent Encryption

被引:1
|
作者
Youn, Taek-Young [1 ]
Chang, Ku-Young [1 ]
Rhee, Kyung Hyune [2 ]
Shin, Sang Uk [2 ]
机构
[1] ETRI, Daejeon, South Korea
[2] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 04期
关键词
Client-side deduplication; Convergent encryption; Proofs of ownership; Access privilege;
D O I
10.3966/160792642018081904025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes the method to provide efficient use of cloud storage while supporting secure data sharing in the cloud. In order to provide authorized deduplication, we use the convergent encryption scheme and apply an access privilege to generate a convergent key. Because of this, the user without proper privileges will not be able to generate the convergent key and thus cannot access the shared data. To verify the ownership of the file in the client-side deduplication procedure, we also propose a new proofs of ownership protocol based on an existing Merkle Tree-based protocol. Our scheme provides an adequate trade-off between security and storage space efficiency. By executing the deduplication for users with the same privilege, the effect of deduplication can be reduced. However, in view of the data sharing, our approach has as advantage in the sense that only authorized users can access the files encrypted based on privileges allowed to the users. The proposed scheme is very suitable for the hybrid cloud model considering both the data security and the storage efficiency.
引用
收藏
页码:1229 / 1240
页数:12
相关论文
共 50 条
  • [31] Using Client-Side Access Partitioning for Data Clustering in Big Data Applications
    Liu, Dapeng
    Xu, Shaochun
    Cui, Zengdi
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 149 - 153
  • [32] Client-side access control enforcement using trusted computing and PEI models
    George Mason University
    不详
    不详
    不详
    不详
    不详
    J High Speed Networks, 2006, 3 (229-245):
  • [33] A Study on Light-Weight and Efficient Proof of Ownership in Client-Side Deduplication Environment
    Kim, Won-Bin
    Lee, Im-Yeong
    ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 10409 - 10413
  • [34] Client-side deception using architectural degradation
    Heimbigner, D
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 187 - 193
  • [35] Client-side enhancements using portable interceptors
    Friedman, R
    Hadad, E
    SIXTH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2001, : 179 - 185
  • [36] Client-side enhancements using portable interceptors
    Friedman, R
    Hadad, E
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2002, 17 (02): : 95 - 101
  • [37] Client-Side Adaptation: An Approach Based in Reutilization Using Transversal Models
    Firmenich, Sergio
    Gordillo, Silvia
    Rossi, Gustavo
    Winckler, Marco
    CURRENT TRENDS IN WEB ENGINEERING, 2010, 6385s : 566 - +
  • [38] MySecPol: A Client-Side Policy Language for Safe and Secure Browsing
    Pathania, Amit
    Radhika, B. S.
    Shyamasundar, Rudrapatna
    INFORMATION SYSTEMS SECURITY, ICISS 2018, 2018, 11281 : 427 - 447
  • [39] Using a proxy to measure client-side Web performance
    Liston, R
    Zegura, E
    WEB CACHING AND CONTENT DELIVERY, 2001, : 267 - 280
  • [40] Personalized Web Accessibility using Client-Side Refactoring
    Garrido, Alejandra
    Firmenich, Sergio
    Rossi, Gustavo
    Grigera, Julian
    Medina-Medina, Nuria
    Harari, Ivana
    IEEE INTERNET COMPUTING, 2013, 17 (04) : 58 - 66