Cloud data secure deduplication scheme via role-based symmetric encryption
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018077/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539471013576704 |
---|---|
author | Jinbo XIONG Yuanyuan ZHANG Youliang TIAN Zuobin YING Qi LI Rong MA |
author_facet | Jinbo XIONG Yuanyuan ZHANG Youliang TIAN Zuobin YING Qi LI Rong MA |
author_sort | Jinbo XIONG |
collection | DOAJ |
description | The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient. |
format | Article |
id | doaj-art-f735169cb7a24dbc9c60e087056826f0 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-f735169cb7a24dbc9c60e087056826f02025-01-14T07:14:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-05-0139597359718142Cloud data secure deduplication scheme via role-based symmetric encryptionJinbo XIONGYuanyuan ZHANGYouliang TIANZuobin YINGQi LIRong MAThe rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018077/role-based symmetric encryptionprivacy protectionauthorized deduplicationdata deduplication |
spellingShingle | Jinbo XIONG Yuanyuan ZHANG Youliang TIAN Zuobin YING Qi LI Rong MA Cloud data secure deduplication scheme via role-based symmetric encryption Tongxin xuebao role-based symmetric encryption privacy protection authorized deduplication data deduplication |
title | Cloud data secure deduplication scheme via role-based symmetric encryption |
title_full | Cloud data secure deduplication scheme via role-based symmetric encryption |
title_fullStr | Cloud data secure deduplication scheme via role-based symmetric encryption |
title_full_unstemmed | Cloud data secure deduplication scheme via role-based symmetric encryption |
title_short | Cloud data secure deduplication scheme via role-based symmetric encryption |
title_sort | cloud data secure deduplication scheme via role based symmetric encryption |
topic | role-based symmetric encryption privacy protection authorized deduplication data deduplication |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018077/ |
work_keys_str_mv | AT jinboxiong clouddatasecurededuplicationschemeviarolebasedsymmetricencryption AT yuanyuanzhang clouddatasecurededuplicationschemeviarolebasedsymmetricencryption AT youliangtian clouddatasecurededuplicationschemeviarolebasedsymmetricencryption AT zuobinying clouddatasecurededuplicationschemeviarolebasedsymmetricencryption AT qili clouddatasecurededuplicationschemeviarolebasedsymmetricencryption AT rongma clouddatasecurededuplicationschemeviarolebasedsymmetricencryption |