Key-exposure resilient integrity auditing scheme with encrypted data deduplication

For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed tha...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiangsong ZHANG, Chen LI, Zhenhua LIU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019076/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539359489130496
author Xiangsong ZHANG
Chen LI
Zhenhua LIU
author_facet Xiangsong ZHANG
Chen LI
Zhenhua LIU
author_sort Xiangsong ZHANG
collection DOAJ
description For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.
format Article
id doaj-art-81bd1d4e405144ed957ec510a7913c10
institution Kabale University
issn 1000-436X
language zho
publishDate 2019-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-81bd1d4e405144ed957ec510a7913c102025-01-14T07:16:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-04-01409510659726399Key-exposure resilient integrity auditing scheme with encrypted data deduplicationXiangsong ZHANGChen LIZhenhua LIUFor the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019076/cloud storageintegrity auditingkey-exposure resilientencrypted dataclient-side deduplication
spellingShingle Xiangsong ZHANG
Chen LI
Zhenhua LIU
Key-exposure resilient integrity auditing scheme with encrypted data deduplication
Tongxin xuebao
cloud storage
integrity auditing
key-exposure resilient
encrypted data
client-side deduplication
title Key-exposure resilient integrity auditing scheme with encrypted data deduplication
title_full Key-exposure resilient integrity auditing scheme with encrypted data deduplication
title_fullStr Key-exposure resilient integrity auditing scheme with encrypted data deduplication
title_full_unstemmed Key-exposure resilient integrity auditing scheme with encrypted data deduplication
title_short Key-exposure resilient integrity auditing scheme with encrypted data deduplication
title_sort key exposure resilient integrity auditing scheme with encrypted data deduplication
topic cloud storage
integrity auditing
key-exposure resilient
encrypted data
client-side deduplication
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019076/
work_keys_str_mv AT xiangsongzhang keyexposureresilientintegrityauditingschemewithencrypteddatadeduplication
AT chenli keyexposureresilientintegrityauditingschemewithencrypteddatadeduplication
AT zhenhualiu keyexposureresilientintegrityauditingschemewithencrypteddatadeduplication