Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Ded...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2015-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539665965875200 |
---|---|
author | Yue CHEN Chao-ling LI Ju-long LAN Kai-chun JIN Zhong-hui WANG |
author_facet | Yue CHEN Chao-ling LI Ju-long LAN Kai-chun JIN Zhong-hui WANG |
author_sort | Yue CHEN |
collection | DOAJ |
description | To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks. |
format | Article |
id | doaj-art-7fc4e7d0dfb94a04a2a798c363c6518d |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2015-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-7fc4e7d0dfb94a04a2a798c363c6518d2025-01-14T06:53:29ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-09-013611259695274Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownershipYue CHENChao-ling LIJu-long LANKai-chun JINZhong-hui WANGTo solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/cloud storagesensitive data deduplicationproofs of ownershipMerkle hash treehomomorphic MAC |
spellingShingle | Yue CHEN Chao-ling LI Ju-long LAN Kai-chun JIN Zhong-hui WANG Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership Tongxin xuebao cloud storage sensitive data deduplication proofs of ownership Merkle hash tree homomorphic MAC |
title | Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership |
title_full | Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership |
title_fullStr | Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership |
title_full_unstemmed | Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership |
title_short | Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership |
title_sort | secure sensitive data deduplication schemes based on deterministic probabilistic proof of file ownership |
topic | cloud storage sensitive data deduplication proofs of ownership Merkle hash tree homomorphic MAC |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/ |
work_keys_str_mv | AT yuechen securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership AT chaolingli securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership AT julonglan securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership AT kaichunjin securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership AT zhonghuiwang securesensitivedatadeduplicationschemesbasedondeterministicprobabilisticproofoffileownership |