Conference Proceeding Article
Cloud storage as one of the most important cloud services enables cloud users to save more data without enlarging its own storage. In order to eliminate repeated data and improve the utilization of storage, deduplication is employed to cloud storage. Due to the concern about data security and user privacy, encryption is introduced, but incurs new challenge to cloud data deduplication. Existing work cannot achieve flexible access control and user revocation. Moreover, few of them can support efficient ownership proof, especially public verifiability of ownership. In this paper, we propose a secure encrypted data deduplication scheme with effective ownership proof and user revocation. We evaluate its performance and prove its security. The simulation results show that our scheme is efficient and effective for potential practical employment.
Deduplication, Homomorphic encryption, Proxy re-encryption, User revocation
Databases and Information Systems | Information Security
Algorithms and architectures for parallel processing: 17th International Conference ICA3PP 2017, Helsinki, Finland, August 21-23, Proceedings
City or Country
DING, Wenxiu; YAN, Zheng; and DENG, Robert H..
Secure encrypted data deduplication with ownership proof and user revocation. (2017). Algorithms and architectures for parallel processing: 17th International Conference ICA3PP 2017, Helsinki, Finland, August 21-23, Proceedings. 297-312. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/3788
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.