Secure encrypted data deduplication with ownership proof and user revocation

Wenxiu Ding, Zheng Yan*, Robert H. Deng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

5 Citations (Scopus)

Abstract

Cloud storage as one of the most important cloud services enables cloud users to save more data without enlarging its own storage. In order to eliminate repeated data and improve the utilization of storage, deduplication is employed to cloud storage. Due to the concern about data security and user privacy, encryption is introduced, but incurs new challenge to cloud data deduplication. Existing work cannot achieve flexible access control and user revocation. Moreover, few of them can support efficient ownership proof, especially public verifiability of ownership. In this paper, we propose a secure encrypted data deduplication scheme with effective ownership proof and user revocation. We evaluate its performance and prove its security. The simulation results show that our scheme is efficient and effective for potential practical employment.

Original languageEnglish
Title of host publicationAlgorithms and Architectures for Parallel Processing - 17th International Conference, ICA3PP 2017, Proceedings
Pages297-312
Number of pages16
Volume10393 LNCS
DOIs
Publication statusPublished - 2017
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Algorithms and Architectures for Parallel Processing - Helsinki, Finland
Duration: 21 Aug 201723 Aug 2017
Conference number: 17

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10393 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

ConferenceInternational Conference on Algorithms and Architectures for Parallel Processing
Abbreviated titleICA3PP
CountryFinland
CityHelsinki
Period21/08/201723/08/2017

Keywords

  • Deduplication
  • Homomorphic encryption
  • Proxy re-encryption
  • User revocation

Fingerprint Dive into the research topics of 'Secure encrypted data deduplication with ownership proof and user revocation'. Together they form a unique fingerprint.

Cite this