Affiliation:
1. School of Information Science and Technology, University of International Relations, Beijing 100091, China
2. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
Abstract
Tag deduplication is an emerging technique to eliminate redundancy in cloud storage, which works by signing integrity tags with a content-associated key instead of user-associated secret key. To achieve public auditability in this scenario, the linkage between cloud users and their integrity tags is firstly re-established in current solutions, which provides a potential side channel to malicious third-party auditor to steal the existence privacy of a certain target file. Such kind of attack, which is also possible among classic public auditing schemes, still cannot be well resisted and is now becoming a big obstacle in using this technique. In this paper, we propose a secure aggregation-based tag deduplication scheme (ATDS), which takes the lead to consider resistance against side channel attack during the process of public verification. To deal with this problem, we define a user-associated integrity tag based on the defined content-associated polynomial and devise a Lagrangian interpolation-based aggregation strategy to achieve tag deduplication. With the help of this technique, content-associated public key is able to be utilized instead of a user-associated one to achieve auditing. Once the verification is passed, the TPA is just only able to make sure that the verified data are correctly corresponding to at least a group of users in cloud storage, rather than determining specific owners. The security analysis and experiment results show that the proposed scheme is able to resist side channel attack and is more efficient compared with the state of the art.
Funder
Fundamental Research Funds for the Central Universities
Subject
Computer Networks and Communications,Information Systems
Reference20 articles.
1. Reclaiming space from duplicate files in a serve-less distributed file system;J. Douceur
2. One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage;X. F. Liu
3. IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds
4. Barycentric Lagrange Interpolation
5. Provable data possession at untrusted stores;G. Ateniese
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献