Abstract

AbstractData deduplication technology makes the same data only keep one physical copy in the cloud, which can effectively eliminate data redundancy and achieve efficient storage. Data deduplication, especially encrypted data duplication, has become a research hotspot. Convergent encryption can effectively solve the existing problem of encrypted data deduplication. However, the cloud server cannot access plaintext data in the ciphertext environment, and it cannot check the consistency of the ciphertext and file label. Therefore, when the duplicate faking attack occurs, how to effectively trace malicious users becomes a critical problem. In this paper, we firstly introduce the blockchain technology into the scenario of secure data deduplication, and construct a specific deduplication scheme to solve the problem of malicious user tracing. We make use of the traceability of the blockchain to form a tamper-proof data chain. When the duplicate faking attack occurs, we can trace the identity of the malicious user and find out all the data files stored in the cloud server.KeywordsBlockchainData deduplicationTraceabilityData updating

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call