Journal on Communications ›› 2019, Vol. 40 ›› Issue (4): 95-106.doi: 10.11959/j.issn.1000-436x.2019076

• Papers • Previous Articles     Next Articles

Key-exposure resilient integrity auditing scheme with encrypted data deduplication

Xiangsong ZHANG1,Chen LI2,Zhenhua LIU2()   

  1. 1 School of Science,Xi’an Technological University,Xi’an 710021,China
    2 School of Mathematics and Statistics,Xidian University,Xi’an 710071,China
  • Revised:2019-01-22 Online:2019-04-25 Published:2019-05-05
  • Supported by:
    The National Natural Science Foundation of China(61807026);The National Natural Science Foundation of China(61472470);The National Key Research Development Program of China(2017YFB0802000);The Scientific Research Plan Project of Education Department of Shaanxi Province(17JK0362)

Abstract:

For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.

Key words: cloud storage, integrity auditing, key-exposure resilient, encrypted data, client-side deduplication

CLC Number: 

No Suggested Reading articles found!