Balancing Access Control and Privacy for Data Deduplication via Functional Encryption

Author:

Mi Bo1,Long Ping1ORCID,Liu Yang1,Kuang Fengtian2

Affiliation:

1. College of Information Science and Engineering, Chongqing Jiaotong University, Chongqing 400074, China

2. College of Mathematics and Statistics, Chongqing Jiaotong University, Chongqing 400074, China

Abstract

Data deduplication serves as an effective way to optimize the storage occupation and the bandwidth consumption over clouds. As for the security of deduplication mechanism, users’ privacy and accessibility are of utmost concern since data are outsourced. However, the functionality of redundancy removal and the indistinguishability of deduplication labels are naturally incompatible, which bring about a lot of threats on data security. Besides, the access control of sharing copies may lead to infringement on users’ attributes and cumbersome query overheads. To balance the usability with the confidentiality of deduplication labels and securely realize an elaborate access structure, a novel data deduplication scheme is proposed in this paper. Briefly speaking, we drew support from learning with errors (LWE) to make sure that the deduplication labels are only differentiable during the duplication check process. Instead of authority matching, the proof of ownership (PoW) is then implemented under the paradigm of inner production. Since the deduplication label is light-weighted and the inner production is easy to carry out, our scheme is more efficient in terms of computation and storage. Security analysis also indicated that the deduplication labels are distinguishable only for duplication check, and the probability of falsifying a valid ownership is negligible.

Funder

National Natural Science Foundation of China

Publisher

Hindawi Limited

Subject

General Engineering,General Mathematics

Reference17 articles.

1. Secure data deduplication with reliable key management for dynamic updates in cpss;M. Wen;IEEE Transactions on Computational Social Systems,2016

2. A Hybrid Cloud Approach for Secure Authorized Deduplication

3. Secure multi-server-aided data deduplication in cloud computing

4. Side Channels in Cloud Services: Deduplication in Cloud Storage

5. Oblivious Transfer Based on NTRUEncrypt

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of “Traffic Engineering”;Mobile Networks and Applications;2023-08-18

2. Dynamic and Efficient Access Control Based On Function Encryption;2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS);2021-12-17

3. Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption;Security and Communication Networks;2021-12-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3