Journal on Communications ›› 2020, Vol. 41 ›› Issue (5): 72-83.doi: 10.11959/j.issn.1000-436x.2020062

• Papers • Previous Articles     Next Articles

Data access control policy of encrypted deduplication system

Chunfu JIA1,2,Guanxiong HA1,2,Ruiqi LI1,2   

  1. 1 College of Cyber Science,Nankai University,Tianjin 300350,China
    2 Tianjin Key Laboratory of Network and Data Security Technology,Tianjin 300350,China
  • Revised:2020-03-03 Online:2020-05-25 Published:2020-05-30
  • Supported by:
    The National Key Research and Development Program of China(2018YFA0704703);The National Natural Science Foundation of China(61972215);The National Natural Science Foundation of China(61772291);The National Natural Science Foundation of China(61702399);The National Natural Science Foundation of China(61972073);The Natural Science Foundation of TianJin(17JCZDJC30500)

Abstract:

To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.

Key words: update of security policy, authorized deduplication, self-control object, access control, cloud data security

CLC Number: 

No Suggested Reading articles found!