4.7 Article

Cloud storage auditing with deduplication supporting different security levels according to data popularity

期刊

出版社

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2019.02.015

关键词

Cloud storage auditing; Data deduplication; Semantic security; Data popularity

资金

  1. National Natural Science Foundation of China [61572267, 61602275]
  2. National Cryptography Development Fund of China [MMJJ20170118]
  3. Open Project of Co-Innovation Center for Information Supply and Assurance Technology, Anhui University
  4. Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, NJUPT [BDSIP1806]
  5. Open Project of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences

向作者/读者索取更多资源

The public cloud storage auditing with deduplication is proposed to check the integrity of cloud data under the condition that the cloud stores only a single copy of the same file from different users. To the best of our knowledge, the existing schemes about cloud storage auditing with deduplication cannot support semantic security for cloud data. The recent data breach incidents have led to an increased demand for the security of encryption schemes. Under the circumstances, we consider to provide different security levels according to the popularity of cloud data. We use the semantic secure encryption to encrypt the unpopular data (private data) to realize semantic security and use convergent encryption to encrypt popular data to realize cipher-text deduplication. However, there exists a big challenge for cloud storage auditing when data popularity changes. Because encryption algorithms are different for popular data and unpopular data, the corresponding ciphertext will have to change once data popularity changes. The old authenticators cannot be valid for the integrity checking any longer after ciphertext changes. In order to overcome this challenge, we explore the numerical relationship between old authenticators and new ones. In our designed scheme, it is not necessary for users to be online for doing extra computation when data popularity changes. The cloud can perform the task of authentications transforming to ensure that the cloud storage auditing still smoothly runs. By detailed security Proof and performance analysis, we show that the proposed scheme is secure and efficient.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据