Data access control policy of encrypted deduplication system

To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such a...

Full description

Saved in:
Bibliographic Details
Main Authors: Chunfu JIA, Guanxiong HA, Ruiqi LI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2020-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020062/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539328149291008
author Chunfu JIA
Guanxiong HA
Ruiqi LI
author_facet Chunfu JIA
Guanxiong HA
Ruiqi LI
author_sort Chunfu JIA
collection DOAJ
description To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.
format Article
id doaj-art-1b1ecbc0758f4eb9a06c5b8f988c28f0
institution Kabale University
issn 1000-436X
language zho
publishDate 2020-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-1b1ecbc0758f4eb9a06c5b8f988c28f02025-01-14T07:19:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2020-05-0141728359735392Data access control policy of encrypted deduplication systemChunfu JIAGuanxiong HARuiqi LITo solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020062/update of security policyauthorized deduplicationself-control objectaccess controlcloud data security
spellingShingle Chunfu JIA
Guanxiong HA
Ruiqi LI
Data access control policy of encrypted deduplication system
Tongxin xuebao
update of security policy
authorized deduplication
self-control object
access control
cloud data security
title Data access control policy of encrypted deduplication system
title_full Data access control policy of encrypted deduplication system
title_fullStr Data access control policy of encrypted deduplication system
title_full_unstemmed Data access control policy of encrypted deduplication system
title_short Data access control policy of encrypted deduplication system
title_sort data access control policy of encrypted deduplication system
topic update of security policy
authorized deduplication
self-control object
access control
cloud data security
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020062/
work_keys_str_mv AT chunfujia dataaccesscontrolpolicyofencrypteddeduplicationsystem
AT guanxiongha dataaccesscontrolpolicyofencrypteddeduplicationsystem
AT ruiqili dataaccesscontrolpolicyofencrypteddeduplicationsystem