Cloud data secure deduplication scheme via role-based symmetric encryption

The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring...

Full description

Saved in:
Bibliographic Details
Main Authors: Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018077/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539471013576704
author Jinbo XIONG
Yuanyuan ZHANG
Youliang TIAN
Zuobin YING
Qi LI
Rong MA
author_facet Jinbo XIONG
Yuanyuan ZHANG
Youliang TIAN
Zuobin YING
Qi LI
Rong MA
author_sort Jinbo XIONG
collection DOAJ
description The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.
format Article
id doaj-art-f735169cb7a24dbc9c60e087056826f0
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-f735169cb7a24dbc9c60e087056826f02025-01-14T07:14:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-05-0139597359718142Cloud data secure deduplication scheme via role-based symmetric encryptionJinbo XIONGYuanyuan ZHANGYouliang TIANZuobin YINGQi LIRong MAThe rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018077/role-based symmetric encryptionprivacy protectionauthorized deduplicationdata deduplication
spellingShingle Jinbo XIONG
Yuanyuan ZHANG
Youliang TIAN
Zuobin YING
Qi LI
Rong MA
Cloud data secure deduplication scheme via role-based symmetric encryption
Tongxin xuebao
role-based symmetric encryption
privacy protection
authorized deduplication
data deduplication
title Cloud data secure deduplication scheme via role-based symmetric encryption
title_full Cloud data secure deduplication scheme via role-based symmetric encryption
title_fullStr Cloud data secure deduplication scheme via role-based symmetric encryption
title_full_unstemmed Cloud data secure deduplication scheme via role-based symmetric encryption
title_short Cloud data secure deduplication scheme via role-based symmetric encryption
title_sort cloud data secure deduplication scheme via role based symmetric encryption
topic role-based symmetric encryption
privacy protection
authorized deduplication
data deduplication
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018077/
work_keys_str_mv AT jinboxiong clouddatasecurededuplicationschemeviarolebasedsymmetricencryption
AT yuanyuanzhang clouddatasecurededuplicationschemeviarolebasedsymmetricencryption
AT youliangtian clouddatasecurededuplicationschemeviarolebasedsymmetricencryption
AT zuobinying clouddatasecurededuplicationschemeviarolebasedsymmetricencryption
AT qili clouddatasecurededuplicationschemeviarolebasedsymmetricencryption
AT rongma clouddatasecurededuplicationschemeviarolebasedsymmetricencryption