A novel role symmetric encryption algorithm for authorized deduplication in cloud

The explosive growth of multimedia data promotes us to enter the era of big data. To improve the storage efficiency and reduce the management expenditure of these massive data, deduplication is a promising technology to meet these requirements. However, it arises serious privacy concerns and poses new security challenges, such as privacy leakage and unauthorized access. To tackle these problems, in this paper, we propose a novel role symmetric encryption (RSE) algorithm and construct an authorized deduplication scheme (RSEDup) based on the role symmetric encryption to achieve the authorized deduplication in cloud. The RSEDup scheme is the first solution to prevent privacy leakage and achieve the authorized deduplication effectively. Performance evaluation shows the efficiency of the proposed scheme.

[1]  Fuchun Guo,et al.  BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Yanyan Wang,et al.  Dynamic Coding Control in Social Intermittent Connectivity Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[3]  Tao Jiang,et al.  Secure and Efficient Cloud Data Deduplication With Randomized Tag , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Shigang Chen,et al.  Two-Party Fine-Grained Assured Deletion of Outsourced Data in Cloud Systems , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[5]  Darrell D. E. Long,et al.  Secure data deduplication , 2008, StorageSS '08.

[6]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[7]  Kwangjo Kim,et al.  Differentially private client-side data deduplication protocol for cloud storage services , 2015, Secur. Commun. Networks.

[8]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[9]  Yuanyuan Zhang,et al.  Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications , 2017, ICCCS.

[10]  Alessandro Sorniotti,et al.  A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.

[11]  Kim-Kwang Raymond Choo,et al.  ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments , 2016, SecureComm.

[12]  Hong Jiang,et al.  A Comprehensive Study of the Past, Present, and Future of Data Deduplication , 2016, Proceedings of the IEEE.

[13]  Jeffrey S. Vetter,et al.  A Survey Of Architectural Approaches for Data Compression in Cache and Main Memory Systems , 2016 .

[14]  Honggang Wang,et al.  An Energy-Efficient Data Forwarding Strategy for Heterogeneous WBANs , 2016, IEEE Access.

[15]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[16]  Xiong Jinbo,et al.  Research progress on secure data deduplication in cloud , 2016 .

[17]  Hui Li,et al.  Secure multi-server-aided data deduplication in cloud computing , 2015, Pervasive Mob. Comput..

[18]  Honggang Wang,et al.  A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks , 2015, IEEE Communications Magazine.

[19]  Honggang Wang,et al.  Privacy-Preserving Multimedia Big Data Aggregation in Large-Scale Wireless Sensor Networks , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[20]  Xiaosong Zhang,et al.  Information Leakage in Encrypted Deduplication via Frequency Analysis , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[21]  Jianfeng Ma,et al.  A full lifecycle privacy protection scheme for sensitive data in cloud computing , 2014, Peer-to-Peer Networking and Applications.

[22]  Jian Weng,et al.  Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control , 2016, AsiaCCS.