Updatable block-level deduplication of encrypted data with efficient auditing in cloud storage

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:wenty2008
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Updatable block-level message-locked encryption (MLE) can efficiently update encrypted data,and public auditing can verify the integrity of cloud storage data by utilizing a third party auditor (TPA).However,there are seldom schemes supporting both updatable block-level deduplication and public auditing.In this paper,an updatable block-level deduplication scheme with efficient auditing is proposed based on a tree-based authenticated structure.In the proposed scheme,the cloud server (CS) can perform block-level deduplication,and the TPA achieves integrity auditing tasks.When a data block is updated,the ciphertext and auditing tags could be updated efficiently.The security analysis demonstrates that the proposed scheme can achieve privacy under chosen distribution attacks in secure deduplication and resist uncheatable chosen distribution attacks (UNCCDA) in proof of ownership (PoW).Furthermore,the integrity auditing process is proven secure under adaptive chosen-message attacks.Compared with previous relevant schemes,the proposed scheme achieves better functionality and higher efficiency.
其他文献
With the development and application of information technology,the problem of personal privacy leakage is becoming more and more serious.Most attribute-based broadcast encryption (ABBE) schemes focus on data security,while ignoring the protection of the p
Aiming at the coexistence of cellular network and wireless fidelity (WiFi) network,a coalitional game-based WiFi offloading algorithm in heterogeneous networks is proposed.Firstly,this paper defines the user fairness utility function that comprehensively
To reduce fetching cost from a remote source,it is natural to cache information near the users who may access the information later.However,with development of 5G ultra-dense cellular networks andmobile edge computing (MEC),a reasonable selection among ed
With the advantages of low cost and high mobility,unmanned aerial vehicles (UAVs) have played an important role in wireless communication.We investigate a UAV-enabled mobile relaying system,where a UAV is used as a mobile relay to assist in the communicat
Arbitrated quantum signature (AQS) is an important branch in quantum cryptography to authenticate quantum information,and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS.Recently,it is discovered that an AQS protocol based on
Low earth orbit (LEO) satellite network provides global coverage and supports a wide range of services.However,due to the rapid changes and energy-limitation of satellites,how to meet the demand of the quality of service (QoS) from ground traffic and prol
Recently,physical layer security in wireless communication system attracts much attention,and the reconciliation protocol plays an important role in the final secure key distillation,since the secret keys extracted from the realistic characteristics of th
Paxos is a well-known distributed algorithm that provides strong consistency.However,the original Paxos has several shortcomings,including those of slow elections,redundant communications and excessive traffic of the coordinator node.In order to tackle th
Hybrid analog-digital beamforming is recognized as a promising solution for a practical implementation of massive multiple-input multiple-output (MIMO) systems based on millimeter-wave (mmWave) technology.In view of the overwhelming hardware cost and exce
Mobility prediction is one of the promising technologies for improving quality of service (QoS) and network resource utilization.In future heterogeneous networks (HetNets),the network topology will become extremely complicated due to the widespread deploy