Security control scheme for cloud data copy based on differential privacy model
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was en...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-05-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00163 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530200494440448 |
---|---|
author | Jun REN Jin-bo XIONG Zhi-qiang YAO |
author_facet | Jun REN Jin-bo XIONG Zhi-qiang YAO |
author_sort | Jun REN |
collection | DOAJ |
description | In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space. |
format | Article |
id | doaj-art-39fe3ce12e2e452591c488ee91784a80 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2017-05-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-39fe3ce12e2e452591c488ee91784a802025-01-15T03:05:43ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-05-013384659550456Security control scheme for cloud data copy based on differential privacy modelJun RENJin-bo XIONGZhi-qiang YAOIn cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00163data deduplicationdifferential privacyconvergent encryptionhybrid cloudside channel attack |
spellingShingle | Jun REN Jin-bo XIONG Zhi-qiang YAO Security control scheme for cloud data copy based on differential privacy model 网络与信息安全学报 data deduplication differential privacy convergent encryption hybrid cloud side channel attack |
title | Security control scheme for cloud data copy based on differential privacy model |
title_full | Security control scheme for cloud data copy based on differential privacy model |
title_fullStr | Security control scheme for cloud data copy based on differential privacy model |
title_full_unstemmed | Security control scheme for cloud data copy based on differential privacy model |
title_short | Security control scheme for cloud data copy based on differential privacy model |
title_sort | security control scheme for cloud data copy based on differential privacy model |
topic | data deduplication differential privacy convergent encryption hybrid cloud side channel attack |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00163 |
work_keys_str_mv | AT junren securitycontrolschemeforclouddatacopybasedondifferentialprivacymodel AT jinboxiong securitycontrolschemeforclouddatacopybasedondifferentialprivacymodel AT zhiqiangyao securitycontrolschemeforclouddatacopybasedondifferentialprivacymodel |