Efficient update of encrypted files for cloud storage

被引:0
|
作者
El Houti, Youssef [1 ]
Miele, Andrea [1 ]
机构
[1] Ecole Polytech Fed Lausanne, LACAL, Lausanne, Switzerland
关键词
SECURITY;
D O I
10.1109/UCC.2015.100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a method for file encryption based on AES-CTR suitable for cloud storage. Our method allows efficient updates of encrypted files by minimizing the amount of data that need to be re-encrypted. It achieves significantly better performance than full re-encryption for file updates. In addition our method addresses several security issues that traditional schemes used in the domain of disk encryption incur especially if used in the cloud. Efficient and secure update of encrypted files is relevant for applications using cloud storage or secure remote storage, which are becoming more and more common.
引用
收藏
页码:565 / 570
页数:6
相关论文
共 50 条
  • [1] Provable Ownership of Encrypted Files in De-Duplication Cloud Storage
    Yang, Chao
    Ma, Jianfeng
    Ren, Jian
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2015, 26 (1-4) : 43 - 72
  • [2] SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage
    Shin, Youngjoo
    Koo, Dongyoung
    Yun, Joobeom
    Hur, Junbeom
    [J]. 2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 482 - 487
  • [3] Encrypted Storage and Retrieval in Cloud Storage Applications
    Huang Yongfeng
    [J]. ZTE Communications, 2010, 8 (04) : 31 - 33
  • [4] Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities
    Yang, Chao
    Zhang, Mingyue
    Jiang, Qi
    Zhang, Junwei
    Li, Danping
    Ma, Jianfeng
    Ren, Jian
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 243 - 258
  • [5] An Efficient Conjunctive Keyword and Phase Search Scheme for Encrypted Cloud Storage Systems
    Poon, Hoi Ting
    Miri, Ali
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 508 - 515
  • [6] Phrase Search for Encrypted Cloud Storage
    Chen, Yen-Chung
    Wu, Yu-Sung
    Tzeng, Wen-Guey
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (02) : 401 - 417
  • [7] ENSURING CONSISTENCY FILE AUTHENTICATION OVER ENCRYPTED FILES IN THE CLOUD
    Kumar, V. Venkatesa
    Murugavel, A.
    [J]. 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [8] Phrase Searching for Encrypted Cloud Storage
    Gaware, Ankita J.
    Theng, Deepti. P.
    [J]. HELIX, 2018, 8 (05): : 3746 - 3749
  • [9] Scanning for Viruses on Encrypted Cloud Storage
    Poon, Hoi Ting
    Miri, Ali
    [J]. 2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 954 - 959
  • [10] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    [J]. FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235