Publication Type

Conference Paper

Publication Date

8-2017

Abstract

Cloud storage as one of the most important cloud services enables cloud users to save more data without enlarging its own storage. In order to eliminate repeated data and improve the utilization of storage, deduplication is employed to cloud storage. Due to the concern about data security and user privacy, encryption is introduced, but incurs new challenge to cloud data deduplication. Existing work cannot achieve flexible access control and user revocation. Moreover, few of them can support efficient ownership proof, especially public verifiability of ownership. In this paper, we propose a secure encrypted data deduplication scheme with effective ownership proof and user revocation. We evaluate its performance and prove its security. The simulation results show that our scheme is efficient and effective for potential practical employment.

Keywords

Deduplication, Homomorphic encryption, Proxy re-encryption, User revocation

Discipline

Databases and Information Systems | Information Security

Research Areas

Cybersecurity

Publication

17th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2017, Helsinki, Finland, 2017, August 21-23

Identifier

10.1007/978-3-319-65482-9_20

Publisher

Sweet & Maxwell

City or Country

Helsinki, Finland

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Additional URL

http://doi.org./10.1007/978-3-319-65482-9_20

Share

COinS