Abstract

Encrypted file deduplication scheme (EFD) can improve its storage space utilization of cloud storage and protect the privacy of files in cloud storage. However, if an enterprise stores its files to cloud storage that has deployed an encrypted file deduplication scheme that does not support permission checking, this will destroy the permission of the enterprise files and bring some security problems. This seriously affects the practical value of EFD and prevents it from deploying in concrete cloud storage. To resolve this problem, we propose an encrypted file deduplication scheme with permission (EFDSP) and construct the EFDSP by using the hidden vector encryption (HVE). We have analyzed the security of EFDSP. The results have shown that EFDSP is secure and it can prevent the online deduplication oracle attack. We implement EFDSP and conduct the performance evaluation. The results show that the performance of EFDSP is little inferior to that of SADS, which is the only existing encrypted file deduplication scheme with permission, but the performance gap decreases with the increasing number of the authorized users and EFDSP has overcome the security weakness of SADS.

Highlights

  • Because TV푝푟표푗푒푐푡푠푢푝푒푟V푖푠표푟[3] ≠ TV푝푟표푔푎푚푚푒푟[3], the permission level of the project supervisor does not match that of project member, and encrypted file deduplication scheme with permission (EFDSP) can determine the files of project supervisor which cannot deduplicate with the files of project member that are stored in the cloud storage

  • Li et al proposed a secure encrypted file deduplication with permission based on hybrid cloud, but its scheme has a security weakness

  • We design an encrypted file deduplication model and construct an encrypted file deduplication scheme with permission (EFDSP) by using the permission vector and hidden vector encryption (HVE) and we optimize the performance of EFDSP

Read more

Summary

Introduction

Li et al proposed a secure authorized deduplication scheme based on a hybrid cloud (SADS) [1] They introduce a private cloud in SADS to preserve the user permissions and generate a permission tag for a user when it uploads a file. We study the problem on how to enable cloud storage to deduplicate a user encrypted file without destroying its file permission. We design an encrypted file deduplication scheme with permission, which has overcome the security weakness of SADS. In EFDSP, the file owner enables the cloud storage to perform deduplication when other users with the same or high permission level upload the duplication files to the cloud storage. In EFDSP, a user with low permission level needs to upload the file even though there exists a duplication file in the cloud storage.

Bilinear Pairing
Problem and Definition
The Permission Vector and the Permission Relation
A Construction for EFDSP
Optimization for EFDSP
Security Analyses for EFDSP
Experiments
Related Works
10. Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call