• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544
Citation: Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544

Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion

More Information
  • Published Date: December 31, 2014
  • Abstract As the rapid adoption of cloud storage services, a new technology of client-side deduplication is proposed to save the bandwidth of uploading copies of existing files to the server. This promising technology, however, has been recently found being vulnerable to a new kind of attack, in which by learning just a small piece of information about the file, namely its Hash value, an attacker is able to get the entire file from the server. To solve the problems mentioned above, we propose a cryptographically secure and efficient scheme to support cross-user client side deduplication over encrypted file. The new scheme utilizes the technique of spot checking in which the client only need to access small portions of the original file, dynamic coefficients, randomly chosen indices of the original files and a subtle approach to distribute the file encrypting key among clients to satisfy security requirements. Extensive security analysis shows that the proposed scheme can generate provable ownership of the encrypted file (POEF) with the presence of the curious server, and maintain a high detection probability of the client misbehavior. Both performance analysis and simulation results demonstrate that our proposed scheme is much more efficient than the existing schemes, especially in reducing the burden of the client.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1805) PDF downloads (1019) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return