BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management

被引:0
|
作者
Guipeng Zhang
Haoran Xie
Zhenguo Yang
Xiaohui Tao
Wenyin Liu
机构
[1] Guangdong University of Technology,School of Computer Science and Technology
[2] Lingnan University,Department of Computing and Decision Sciences
[3] University of Southern Queensland,School of Sciences
来源
Neural Processing Letters | 2022年 / 54卷
关键词
Deduplication; Convergent encryption; Secret sharing scheme; Key management; Blockchain;
D O I
暂无
中图分类号
学科分类号
摘要
Secure deduplication aims to efficiently eliminate redundant data in cloud storage system, where convergent encryption (CE) is widely-used to provide the data confidentiality. As the number of convergent keys (CKs) in CE will increase dramatically with enlarging data, there is a critical issue that how to safely manage the CKs. Previous works usually introduce a fully-trusted key management server (KS) to ensure the CKs security, resulting in data leakage by KS in reality. In this paper, we propose a blockchain-based secure deduplication scheme with reliable CK management, denoted as BDKM, which introduces different secret information to CE to enhance the data confidentiality in different level deduplications. To realize secure and reliable CK management, the CK will be divided into key segments by using secret sharing scheme and distributed on blockchain as transactions. Therefore, only the valid data owner can recover the CK from the blockchain and the original data will be protected even if the adversaries have colluded with cloud service provider. Security analysis and performance evaluation demonstrate that our proposed scheme can remain secure under the proposed security models with a limited overhead.
引用
收藏
页码:2657 / 2674
页数:17
相关论文
共 50 条
  • [1] BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management
    Zhang, Guipeng
    Xie, Haoran
    Yang, Zhenguo
    Tao, Xiaohui
    Liu, Wenyin
    [J]. NEURAL PROCESSING LETTERS, 2022, 54 (04) : 2657 - 2674
  • [2] Blockchain-Based Secure and Reliable Distributed Deduplication Scheme
    Li, Jingyi
    Wu, Jigang
    Chen, Long
    Li, Jiaxing
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT I, 2018, 11334 : 393 - 405
  • [3] A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs
    Tian, Youliang
    Wang, Zuan
    Xiong, Jinbo
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 6193 - 6202
  • [4] A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN
    Tan, Mingxi
    Sun, Dazhi
    Li, Xiaohong
    [J]. 2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [5] Blockchain-Based Secure and Verifiable Deduplication Scheme for Cloud-Assisted Internet of Things
    Zhang, Guipeng
    Chen, Pinghua
    Liao, Yongwei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13995 - 14006
  • [6] Secure Deduplication with Efficient and Reliable Convergent Key Management
    Li, Jin
    Chen, Xiaofeng
    Li, Mingqiang
    Li, Jingwei
    Lee, Patrick P. C.
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (06) : 1615 - 1625
  • [7] A Secure Blockchain-Based Group Mobility Management Scheme in VANETs
    Lai, Chengzhe
    Ding, Yuhan
    [J]. 2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [8] Secure ABE Scheme for Access Management in Blockchain-Based IoT
    Zhang, Jiansheng
    Xin, Yang
    Gao, Yulong
    Lei, Xiaohui
    Yang, Yixian
    [J]. IEEE ACCESS, 2021, 9 : 54840 - 54849
  • [9] Blockchain-Based Secure Key Management for Mobile Edge Computing
    Li, Jiaxing
    Wu, Jigang
    Chen, Long
    Li, Jin
    Lam, Siew-Kei
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (01) : 100 - 114
  • [10] Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage
    Tian, Guohua
    Hu, Yunhan
    Wei, Jianghong
    Liu, Zheli
    Huang, Xinyi
    Chen, Xiaofeng
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3941 - 3954