ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2018, Vol. 55 ›› Issue (10): 2134-2148.doi: 10.7544/issn1000-1239.2018.20180441

Special Issue: 2018分布式安全与区块链技术研究专题

Previous Articles     Next Articles

Verifiable Secure Data Deduplication Based on User-Defined Security Requirements

Liu Hongyan1,2, Xian Hequn1,2, Lu Xiuqing1,2, Hou Ruitao1, Gao Yuan1   

  1. 1(College of Computer Science and Technology, Qingdao University, Qingdao, Shandong 266071);2(State Key Laboratory of Integrated Services Networks (Xidian University), Xi’an 710071)
  • Online:2018-10-01

Abstract: With the increasing of cloud storage users, data deduplication technology is widely applied in cloud computing environment. One of the key issues in cloud computing security is to effectively protect data privacy while implementing efficient deduplication and achieving secure multi-party computation among the clients. Cloud users’ control over the deduplication process is considered for the first time. By introducing the user attribute-based security requirement mechanism, a novel data deduplication scheme in cloud storage is proposed, which doesn’t require any online trusted third party. It achieves users’ control over data sharing and fully protects data privacy. Based on bilinear mapping, data tags are constructed to keep track of the data without leaking any exploitable information. The combination of file-level and block-level deduplication is applied to obtain better efficiency with fine data granularity. The ownership proving method is designed based on multi-party computation principles and bloom filter, which ensures only authorized users can access the data. It can prevent malicious users from conducting eavesdropping attack. The data encryption key is protected via broadcast encryption, which secures the data deduplication process. The correctness and security of the proposed scheme are analyzed and proved. Simulation results show that the scheme is secure and effective.

Key words: secure multi-party computation, privacy protection, bilinear mapping, bloom filter, proofs of ownership

CLC Number: