Secure encrypted data deduplication with ownership proof and user revocation

Wenxiu Ding, Zheng Yan*, Robert H. Deng

*Tämän työn vastaava kirjoittaja

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussaConference contributionScientificvertaisarvioitu

6 Sitaatiot (Scopus)

Abstrakti

Cloud storage as one of the most important cloud services enables cloud users to save more data without enlarging its own storage. In order to eliminate repeated data and improve the utilization of storage, deduplication is employed to cloud storage. Due to the concern about data security and user privacy, encryption is introduced, but incurs new challenge to cloud data deduplication. Existing work cannot achieve flexible access control and user revocation. Moreover, few of them can support efficient ownership proof, especially public verifiability of ownership. In this paper, we propose a secure encrypted data deduplication scheme with effective ownership proof and user revocation. We evaluate its performance and prove its security. The simulation results show that our scheme is efficient and effective for potential practical employment.

AlkuperäiskieliEnglanti
OtsikkoAlgorithms and Architectures for Parallel Processing - 17th International Conference, ICA3PP 2017, Proceedings
Sivut297-312
Sivumäärä16
Vuosikerta10393 LNCS
DOI - pysyväislinkit
TilaJulkaistu - 2017
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisuussa
TapahtumaInternational Conference on Algorithms and Architectures for Parallel Processing - Helsinki, Suomi
Kesto: 21 elokuuta 201723 elokuuta 2017
Konferenssinumero: 17

Julkaisusarja

NimiLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Vuosikerta10393 LNCS
ISSN (painettu)03029743
ISSN (elektroninen)16113349

Conference

ConferenceInternational Conference on Algorithms and Architectures for Parallel Processing
LyhennettäICA3PP
MaaSuomi
KaupunkiHelsinki
Ajanjakso21/08/201723/08/2017

Sormenjälki

Sukella tutkimusaiheisiin 'Secure encrypted data deduplication with ownership proof and user revocation'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Siteeraa tätä