Secure Encrypted Data With Authorized Deduplication in Cloud

被引:18
|
作者
Xiong, Jinbo [1 ]
Zhang, Yuanyuan [2 ,3 ]
Tang, Shaohua [2 ,3 ]
Liu, Ximeng [4 ]
Yao, Zhiqiang [1 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[2] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Role re-encryption; role authorized tree; privacy leakage; authorized deduplication; proof of ownership; ACCESS-CONTROL; OWNERSHIP; EFFICIENT;
D O I
10.1109/ACCESS.2019.2920998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and satisfies the dynamic privilege updating and revoking. Meanwhile, our system supports ownership checking and achieves the proof of ownership for the authorized users efficiently. Specifically, we introduce a management center to handle with the authorized request and establish a role authorized tree (RAT) mapping the relationship of the roles and keys. With the convergent encryption algorithm and the role re-encryption technique, it can be guaranteed that only the authorized user who has the corresponding role re-encryption key can access the specific file without any data leakage. Through role re-encryption key updating and revoking, our system achieves the dynamic updating of the authorized user's privilege. Furthermore, we exploit the dynamic count filters (DCF) to implement the data updating and improve the retrieval of ownership verifying effectively. We conduct the security analysis and the simulation experiment to demonstrate the security and efficiency of our proposed system.
引用
收藏
页码:75090 / 75104
页数:15
相关论文
共 50 条
  • [1] Survey on techniques for Authorized Deduplication of Encrypted data in Cloud
    Waghmare, Milind B.
    Padwekar, Suhasini, V
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 553 - +
  • [2] Secure Cloud Encrypted Data Deduplication Method
    Zhang, Shu-Guang
    Xian, He-Qun
    Wang, Li-Ming
    Liu, Hong-Yan
    [J]. Ruan Jian Xue Bao/Journal of Software, 2019, 30 (12): : 3815 - 3828
  • [3] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [4] A secure authorized deduplication scheme for cloud data based on blockchain
    Zhang, Guipeng
    Yang, Zhenguo
    Xie, Haoran
    Liu, Wenyin
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
  • [5] A Hybrid Cloud Approach for Secure Authorized Deduplication
    Li, Jin
    Li, Yan Kit
    Chen, Xiaofeng
    Lee, Patrick P. C.
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) : 1206 - 1216
  • [6] Authorized Equality Test of Encrypted Data for Secure Cloud Databases
    Ma, Sha
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 223 - 230
  • [7] Authorized Deduplication: an Approach for Secure Cloud Environment
    Waghmare, Vivek
    Kapse, Smita
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 815 - 823
  • [8] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Bai, Jianli
    Yu, Jia
    Gao, Xiang
    [J]. SOFT COMPUTING, 2020, 24 (16) : 12197 - 12214
  • [9] Secure auditing and deduplication for encrypted cloud data supporting ownership modification
    Jianli Bai
    Jia Yu
    Xiang Gao
    [J]. Soft Computing, 2020, 24 : 12197 - 12214
  • [10] Encrypted Data Deduplication in Cloud Storage
    Fan, Chun-I
    Huang, Shi-Yuan
    Hsu, Wen-Che
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 18 - 25