Journal on Communications ›› 2018, Vol. 39 ›› Issue (5): 59-73.doi: 10.11959/j.issn.1000-436x.2018077

• Papers • Previous Articles     Next Articles

Cloud data secure deduplication scheme via role-based symmetric encryption

Jinbo XIONG1,2,Yuanyuan ZHANG2,Youliang TIAN1(),Zuobin YING3,Qi LI4,Rong MA2   

  1. 1 Guizhou Provincial Key Laboratory of Public Big Data (Guizhou University),Guiyang 550025,China
    2 College of Mathematics and Informatics,Fujian Normal University,Fuzhou 350117,China
    3 College of Computer Science and Technology,Anhui University,Hefei 230601,China
    4 School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
  • Revised:2018-03-29 Online:2018-05-01 Published:2018-06-01
  • Supported by:
    The National Natural Science Foundation of China(61772008);The National Natural Science Foundation of China(U1405255);The National Natural Science Foundation of China(61502248);The National Natural Science Foundation of China(61402109);The National Natural Science Foundation of China(61502489);The National Natural Science Foundation of China(61502103);The Science and Technology Major Support Program of Guizhou Province(20183001);Guizhou Provincial Key Laboratory of Public Big Data Research Fund(2017BDKFJJ028)

Abstract:

The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.

Key words: role-based symmetric encryption, privacy protection, authorized deduplication, data deduplication

CLC Number: 

No Suggested Reading articles found!