Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things

被引:3
|
作者
Mi, Bo [1 ]
Li, Yang [1 ]
Darong, Huang [1 ]
Wei, Tiancheng [1 ]
Zou, Qianqian [2 ]
机构
[1] Chongqing Jiaotong Univ, Coll Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Servers; Cloud computing; Data privacy; Encryption; Internet of Things; Cloud; secure data de-duplication; threshold blind signature; Bloom filter; ALGORITHM;
D O I
10.1109/ACCESS.2020.3023750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security concerns. Though intensive researches have been addressed on a convergent cryptosystem for secure data de-duplication, the conflicts amongst functionality, confidentiality, and authority remain unbalanced. More concretely, although data are obfuscated under convergent encryption, a violent dictionary attack is still efficacious since the whole pseudorandom process relies heavily on plaintexts. As for data ownership, the download privilege, which depends on hash value, may also be infringed due to the same reason. To dispose of these problems, we presented a conspiracy-free data de-duplication protocol based on a threshold blind signature in this article. With the help of multiple key servers, the outsourced file and de-duplication label will be computationally indistinguishable from random strings. We used the Boom filter as a tool to implement a proof of ownership, ensuring that the ownership claims made by users are real. It effectively prevents the attacker from using the stolen tag to get the whole file to gain file access without authorization. The most significant innovation of this article is to use homomorphism computation to aggregate and generate partial signature tags, and to introduce a secret sharing mechanism based on The Chinese Remainder Theorem to hide signature keys, thus balancing the security concerns of cloud and client. Compared with existing schemes, both communication and computation performances are preferable in our protocol. As far as we know, our scheme is the only data de-duplication scheme that satisfies the semantic security of ciphertext and label.
引用
收藏
页码:167113 / 167122
页数:10
相关论文
共 50 条
  • [1] Secure data de-duplication based on threshold blind signature and bloom filter in internet of things
    Mi, Bo
    Li, Yang
    Darong, Huang
    Wei, Tiancheng
    Zou, Qianqian
    IEEE Access, 2020, 8 : 167113 - 167122
  • [2] Secure Static Data De-duplication
    Pawar, Rohit
    Zanwar, Payal
    Bora, Shruti
    Kullkarni, Shweta
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (03): : 69 - 73
  • [3] Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
    Li, Le
    Zheng, Dong
    Zhang, Haoyu
    Qin, Baodong
    IEEE ACCESS, 2023, 11 : 28688 - 28698
  • [4] Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing
    Basappa B. Kodada
    Demian Antony D’Mello
    D. K. Santhosh Kumar
    SN Computer Science, 5 (6)
  • [5] Flexible yet Secure De-duplication Service for Enterprise Data on Cloud Storage
    Chuan, Wen Bing
    Ren, Shu Qin
    Keoh, Sye Loong
    Aung, Khin Mi Mi
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 37 - 44
  • [6] Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Xiangyu
    Lu, Rongxing
    Zhang, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 5024 - 5035
  • [7] Attribute Based Storage Mechanism with De-duplication Filter: A Review Paper
    Bhosale, Amarja Hanumant
    Manjrekar, Amrita A.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR COMPETITIVE STRATEGIES, 2019, 40 : 89 - 97
  • [8] A Web Page De-duplication Algorithm Based On Data Cleaning
    Lin, Jian-ming
    Liu, Dong-sheng
    Gao, Shi-wen
    Chen, Wei
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 544 - +
  • [9] Optimization for data de-duplication algorithm based on file content
    Xuejun NIE
    Leihua QIN
    Jingli ZHOU
    Ke LIU
    Jianfeng ZHU
    Yu WANG
    Frontiers of Optoelectronics in China, 2010, 3 (03) : 308 - 316
  • [10] Application for data de-duplication algorithm based on mobile devices
    Xingchen, Ge
    Ning, Deng
    Jian, Yin
    Journal of Networks, 2013, 8 (11) : 2498 - 2505