Publication Type

Conference Proceeding Article

Publication Date

8-2017

Abstract

Cloud storage as one of the most important cloud services enables cloud users to save more data without enlarging its own storage. In order to eliminate repeated data and improve the utilization of storage, deduplication is employed to cloud storage. Due to the concern about data security and user privacy, encryption is introduced, but incurs new challenge to cloud data deduplication. Existing work cannot achieve flexible access control and user revocation. Moreover, few of them can support efficient ownership proof, especially public verifiability of ownership. In this paper, we propose a secure encrypted data deduplication scheme with effective ownership proof and user revocation. We evaluate its performance and prove its security. The simulation results show that our scheme is efficient and effective for potential practical employment.

Keywords

Deduplication, Homomorphic encryption, Proxy re-encryption, User revocation

Discipline

Databases and Information Systems | Information Security

Research Areas

Cybersecurity

Publication

Algorithms and architectures for parallel processing: 17th International Conference ICA3PP 2017, Helsinki, Finland, August 21-23, Proceedings

First Page

297

Last Page

312

ISBN

9783319654812

Identifier

10.1007/978-3-319-65482-9_20

Publisher

Springer Verlag

City or Country

Cham

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Additional URL

http://doi.org./10.1007/978-3-319-65482-9_20

Share

COinS