Journal on Communications ›› 2017, Vol. 38 ›› Issue (7): 18-27.doi: 10.11959/j.issn.1000-436x.2017139

• Papers • Previous Articles     Next Articles

PoSW:novel secure deduplication scheme for collaborative cloud applications

Jin-bo XIONG1,2,Su-ping LI1,Yuan-yuan ZHANG1,Xuan LI1,EA-yong Y2,Zhi-qiang YAO1,3   

  1. 1 Faculty of Software,Fujian Normal University,Fuzhou 350117,China
    2 Fujian Provincial Key Laboratory of Network Security and Cryptology,Fuzhou 350007,China
    3 Fujian Engineering Research Center of Public Service Big Data Mining and Application,Fuzhou 350117,China
  • Revised:2017-04-27 Online:2017-07-01 Published:2017-08-25
  • Supported by:
    The National Natural Science Foundation of China(61402109);The National Natural Science Foundation of China(61370078);The National Natural Science Foundation of China(61502102);The National Natural Science Foundation of China(61502103);The Natural Science Foundation of Fujian Province(2015J05120);The Natural Science Foundation of Fujian Province(2017J05099);Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund(15008);Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province(2015)

Abstract:

In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme.

Key words: proof of shared ownership, secure deduplication, convergent encryption, secure file dispersal, cloud storage

CLC Number: 

No Suggested Reading articles found!