Key-exposure resilient integrity auditing scheme with encrypted data deduplication
For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed tha...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019076/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539359489130496 |
---|---|
author | Xiangsong ZHANG Chen LI Zhenhua LIU |
author_facet | Xiangsong ZHANG Chen LI Zhenhua LIU |
author_sort | Xiangsong ZHANG |
collection | DOAJ |
description | For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model. |
format | Article |
id | doaj-art-81bd1d4e405144ed957ec510a7913c10 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2019-04-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-81bd1d4e405144ed957ec510a7913c102025-01-14T07:16:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-04-01409510659726399Key-exposure resilient integrity auditing scheme with encrypted data deduplicationXiangsong ZHANGChen LIZhenhua LIUFor the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019076/cloud storageintegrity auditingkey-exposure resilientencrypted dataclient-side deduplication |
spellingShingle | Xiangsong ZHANG Chen LI Zhenhua LIU Key-exposure resilient integrity auditing scheme with encrypted data deduplication Tongxin xuebao cloud storage integrity auditing key-exposure resilient encrypted data client-side deduplication |
title | Key-exposure resilient integrity auditing scheme with encrypted data deduplication |
title_full | Key-exposure resilient integrity auditing scheme with encrypted data deduplication |
title_fullStr | Key-exposure resilient integrity auditing scheme with encrypted data deduplication |
title_full_unstemmed | Key-exposure resilient integrity auditing scheme with encrypted data deduplication |
title_short | Key-exposure resilient integrity auditing scheme with encrypted data deduplication |
title_sort | key exposure resilient integrity auditing scheme with encrypted data deduplication |
topic | cloud storage integrity auditing key-exposure resilient encrypted data client-side deduplication |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019076/ |
work_keys_str_mv | AT xiangsongzhang keyexposureresilientintegrityauditingschemewithencrypteddatadeduplication AT chenli keyexposureresilientintegrityauditingschemewithencrypteddatadeduplication AT zhenhualiu keyexposureresilientintegrityauditingschemewithencrypteddatadeduplication |