Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud

作者: Tariqul Islam , Kiho Lim , D. Manivannan

DOI: 10.1109/CCNC46108.2020.9045108

关键词:

摘要: Conventional encryption schemes are being used over the years for securing outsourced data to cloud. However, this impedes deduplication- ability identify and remove duplicate from storage server. The idea of Convergent Encryption was introduced overcome problem which ensures that identical plaintext files will always produce ciphertexts thus enabling deduplication. Nonetheless, scheme is vulnerable a side-channel attack called “confirmation-of-a-file” its variant “learn-the-remaining-information” breach user privacy by observing deduplication operation. To resolve above two seemingly contrasting issues, we propose blends convergent with traditional access control simultaneously achieving confidentiality Both theoretical security analysis experimental results show our semantically secure resilient against attacks. It incurs minor latency overhead while performing file block level Furthermore, it fine-grained efficiently handling key-management process.

参考文章(21)
Jan Stanek, Alessandro Sorniotti, Elli Androulaki, Lukas Kencl, A Secure Data Deduplication Scheme for Cloud Storage Financial Cryptography and Data Security. pp. 99- 118 ,(2014) , 10.1007/978-3-662-45472-5_8
Chuanyi Liu, Xiaojian Liu, Lei Wan, Policy-Based De-duplication in Secure Cloud Storage International Conference on Trustworthy Computing and Services. pp. 250- 262 ,(2012) , 10.1007/978-3-642-35795-4_32
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Thomas Ristenpart, Mihir Bellare, Sriram Keelveedhi, DupLESS: server-aided encryption for deduplicated storage usenix security symposium. pp. 179- 194 ,(2013)
Rodel Miguel, Khin Mi Mi Aung, Mediana, HEDup: Secure Deduplication with Homomorphic Encryption networking architecture and storages. pp. 215- 223 ,(2015) , 10.1109/NAS.2015.7255226
Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro, PerfectDedup: Secure Data Deduplication Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481. pp. 150- 166 ,(2015) , 10.1007/978-3-319-29883-2_10
Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage ieee symposium on security and privacy. ,vol. 8, pp. 40- 47 ,(2010) , 10.1109/MSP.2010.187
Roberto Di Pietro, Alessandro Sorniotti, Boosting efficiency and security in proof of ownership for deduplication computer and communications security. pp. 81- 82 ,(2012) , 10.1145/2414456.2414504
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg, Proofs of ownership in remote storage systems Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 491- 500 ,(2011) , 10.1145/2046707.2046765