Security control scheme for cloud data copy based on differential privacy model

In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was en...

Full description

Saved in:
Bibliographic Details
Main Authors: Jun REN, Jin-bo XIONG, Zhi-qiang YAO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-05-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00163
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530200494440448
author Jun REN
Jin-bo XIONG
Zhi-qiang YAO
author_facet Jun REN
Jin-bo XIONG
Zhi-qiang YAO
author_sort Jun REN
collection DOAJ
description In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.
format Article
id doaj-art-39fe3ce12e2e452591c488ee91784a80
institution Kabale University
issn 2096-109X
language English
publishDate 2017-05-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-39fe3ce12e2e452591c488ee91784a802025-01-15T03:05:43ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-05-013384659550456Security control scheme for cloud data copy based on differential privacy modelJun RENJin-bo XIONGZhi-qiang YAOIn cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00163data deduplicationdifferential privacyconvergent encryptionhybrid cloudside channel attack
spellingShingle Jun REN
Jin-bo XIONG
Zhi-qiang YAO
Security control scheme for cloud data copy based on differential privacy model
网络与信息安全学报
data deduplication
differential privacy
convergent encryption
hybrid cloud
side channel attack
title Security control scheme for cloud data copy based on differential privacy model
title_full Security control scheme for cloud data copy based on differential privacy model
title_fullStr Security control scheme for cloud data copy based on differential privacy model
title_full_unstemmed Security control scheme for cloud data copy based on differential privacy model
title_short Security control scheme for cloud data copy based on differential privacy model
title_sort security control scheme for cloud data copy based on differential privacy model
topic data deduplication
differential privacy
convergent encryption
hybrid cloud
side channel attack
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00163
work_keys_str_mv AT junren securitycontrolschemeforclouddatacopybasedondifferentialprivacymodel
AT jinboxiong securitycontrolschemeforclouddatacopybasedondifferentialprivacymodel
AT zhiqiangyao securitycontrolschemeforclouddatacopybasedondifferentialprivacymodel