RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data

The explosive growth of global data and the gradual evolution of multimedia processing pattern promote us to enter the era of heterogeneous multimedia data. To improve the storage efficiency and reduce the management expenditure of these massive multimedia data in heterogeneous networks, the direct way is multimedia data deduplication. However, it arises serious privacy concerns and poses new security challenges, such as privacy leakage, the side-channel attack and unauthorized access. To solve these issues, we propose a novel role symmetric encryption (RSE) algorithm and a RSE-based proof of ownership (RSE-PoW) scheme for secure deduplication in hierarchical heterogeneous environments, which is based on the role symmetric encryption, proof of ownership and bloom filter. The proposed scheme is the first solution to prevent the privacy leakage and resist against the side-channel attacks, meanwhile, achieve the authorized deduplication effectively for multimedia data in heterogeneous network. Security analysis and performance evaluation show the security and efficiency of our proposed scheme.

[1]  Honggang Wang,et al.  Socially Aware Energy-Efficient Mobile Edge Collaboration for Video Distribution , 2017, IEEE Transactions on Multimedia.

[2]  Chuan Qin,et al.  The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System , 2017, ACM Trans. Storage.

[3]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[4]  Jianfeng Ma,et al.  A full lifecycle privacy protection scheme for sensitive data in cloud computing , 2014, Peer-to-Peer Networking and Applications.

[5]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[6]  Lorena González-Manzano,et al.  An efficient confidentiality-preserving Proof of Ownership for deduplication , 2015, J. Netw. Comput. Appl..

[7]  Yuanyuan Zhang,et al.  A novel role symmetric encryption algorithm for authorized deduplication in cloud , 2017 .

[8]  Shigang Chen,et al.  Two-Party Fine-Grained Assured Deletion of Outsourced Data in Cloud Systems , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[9]  Jeffrey S. Vetter,et al.  A Survey Of Architectural Approaches for Data Compression in Cache and Main Memory Systems , 2016 .

[10]  Jianfeng Ma,et al.  Secure, efficient and revocable multi-authority access control system in cloud storage , 2016, Comput. Secur..

[11]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[12]  Xuan Li,et al.  A secure cloud storage system supporting privacy-preserving fuzzy deduplication , 2016, Soft Comput..

[13]  Ali Miri,et al.  Deduplication Practices for Multimedia Data in the Cloud , 2018 .

[14]  Roberto Di Pietro,et al.  Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.

[15]  Hyunsoo Kwon,et al.  Secure deduplication for multimedia data with user revocation in cloud storage , 2017, Multimedia Tools and Applications.

[16]  Benny Pinkas,et al.  Proofs of ownership in remote storage systems , 2011, CCS '11.

[17]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[18]  Xiaodong Liu,et al.  A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.

[19]  Roberto Di Pietro,et al.  A tunable proof of ownership scheme for deduplication using Bloom filters , 2014, 2014 IEEE Conference on Communications and Network Security.

[20]  Enrico Zio,et al.  A Bayesian Optimal Design for Accelerated Degradation Testing Based on the Inverse Gaussian Process , 2017, IEEE Access.

[21]  Jianfeng Ma,et al.  A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.

[22]  Xiaosong Zhang,et al.  Information Leakage in Encrypted Deduplication via Frequency Analysis , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[23]  Darrell D. E. Long,et al.  Secure data deduplication , 2008, StorageSS '08.

[24]  Mohammad Mannan,et al.  An evaluation of recent secure deduplication proposals , 2016, J. Inf. Secur. Appl..

[25]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[26]  Guangjun Liu,et al.  Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data , 2014, Int. J. Netw. Secur..

[27]  Hong Jiang,et al.  A Comprehensive Study of the Past, Present, and Future of Data Deduplication , 2016, Proceedings of the IEEE.

[28]  Xiong Jinbo,et al.  Research progress on secure data deduplication in cloud , 2016 .

[29]  Honggang Wang,et al.  Node Service Ability Aware Packet Forwarding Mechanism in Intermittently Connected Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[30]  Yuanyuan Zhang,et al.  Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications , 2017, ICCCS.

[31]  Kim-Kwang Raymond Choo,et al.  ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments , 2016, SecureComm.

[32]  Roberto Di Pietro,et al.  Proof of ownership for deduplication systems: A secure, scalable, and efficient solution , 2016, Comput. Commun..

[33]  Jin Li,et al.  Rekeying for Encrypted Deduplication Storage , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[34]  Zhangjie Fu,et al.  Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[35]  Hui Li,et al.  Secure multi-server-aided data deduplication in cloud computing , 2015, Pervasive Mob. Comput..

[36]  Jenq-Shiou Leu,et al.  Design and Implementation of Various File Deduplication Schemes on Storage Devices , 2015, 2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE).

[37]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[38]  Barbara F. Sharf The Critic as Rhetor: Psychiatry and Fantasy Theme Analysis , 1987 .

[39]  Li Lin,et al.  ms‐PoSW: A multi‐server aided proof of shared ownership scheme for secure deduplication in cloud , 2017, Concurr. Comput. Pract. Exp..

[40]  Honggang Wang,et al.  Privacy-Preserving Multimedia Big Data Aggregation in Large-Scale Wireless Sensor Networks , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[41]  Sherali Zeadally,et al.  Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.

[42]  Honggang Wang,et al.  An Energy-Efficient Data Forwarding Strategy for Heterogeneous WBANs , 2016, IEEE Access.