Abstract
The notion of data deduplication enables a user to eliminate duplicate copies of data so that it can save the amount of storage space and network bandwidth. Convergent encryption, as the state-of-art approach, has been widely adopted to perform secure deduplication in the cross-user scenario. However, all the existing solutions cannot support user traceability. That is, there is no way to trace the identities of malicious users for instance in case a user performed a duplicate faking attack. To cope with this issue, in this paper, we propose a novel secure deduplication scheme supporting user traceability by incorporating traceable signatures with the state of the art deduplication technique, such as interactive randomized convergent encryption and proof of ownership.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.