Advanced Search
Volume 41 Issue 2
Jan.  2019
Turn off MathJax
Article Contents
Hua MA, Qianlong DANG, Jianfeng WANG, Zhenhua LIU. Efficient Ciphertext Deduplication and Auditing Scheme with Attribute-based Encryption[J]. Journal of Electronics & Information Technology, 2019, 41(2): 355-361. doi: 10.11999/JEIT170935
Citation: Hua MA, Qianlong DANG, Jianfeng WANG, Zhenhua LIU. Efficient Ciphertext Deduplication and Auditing Scheme with Attribute-based Encryption[J]. Journal of Electronics & Information Technology, 2019, 41(2): 355-361. doi: 10.11999/JEIT170935

Efficient Ciphertext Deduplication and Auditing Scheme with Attribute-based Encryption

doi: 10.11999/JEIT170935
Funds:  The National Natural Science Foundation of China (61702401, 61472470), The China Postdoctoral Science Foundation (2017M613083)
  • Received Date: 2017-10-10
  • Rev Recd Date: 2018-11-14
  • Available Online: 2018-11-19
  • Publish Date: 2019-02-01
  • Existing attribute-based deduplication schemes can support neither auditing of cloud storage data nor revocation of expired users. On the other hand, they are less efficient for deduplication search and users decryption. In order to solve these problems, this paper proposes an efficient deduplication and auditing Attribute-Based Encryption (ABE) scheme. A third-party auditor is introduced to verify the integrity of cloud storage data. Through an agent auxiliary user revocation mechanism, the proposed scheme supports the revocation of expired users. Effective deduplication search tree is put forward to improve the search efficiency, and the proxy decryption mechanism is used to assist users to decrypt. Finally, the security analysis shows that the proposed scheme can achieve IND-CPA security in the public cloud and PRV-CDA security in the private cloud by resorting to the hybrid cloud architecture. The performance analysis shows that the deduplication search is more efficient and the computation cost of user encryption is smaller.

  • loading
  • CHOO K K R, HERMAN M, IORGA M, et al. Cloud forensics: State-of-the-art and future directions[J]. Digital Investigation, 2016, 18: 77–78. doi: 10.1016/j.diin.2016.08.003
    LAI Junzuo, DENG R H, and LI Yingjun. Fully secure cipertext-policy hiding CP-ABE[C]. International Conference on Information Security Practice and Experience, Guangzhou, China, 2011: 24–39. doi: https://doi.org/10.1007/978-3-642-21031-0_3.
    YU Shucheng, WANG Cong, REN Kui, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]. Proceedings of the 29th Conference on Information Communications, San Diego, USA, 2010: 1–9.
    ROUSELAKIS Y and WATERS B. Practical constructions and new proof methods for large universe attribute-based encryption[C]. ACM Sigsac Conference on Computer & Communications Security, Berlin, Germary, 2013: 463–474.
    BELLARE M, KEELVEEDHI S, and RISTENPAR T. Message-locked encryption and secure deduplication[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 2013: 296–312. doi: https://doi.org/10.1007/978-3-642-38348-9_18.
    BELLARE M and KEELVEEDHI S. Interactive messagee- locked encryption and secure deduplication[C]. IACR International Workshop on Public Key Cryptography, Gaithersburg, USA, 2015: 516–538. doi: https://doi.org/10.1007/978-3-662-46447-2_23.
    CUI Hui, DENG R H, LI Yingjiu, et al. Attribute-based storage supporting secure deduplication of encrypted data in cloud[J]. IEEE Transactions on Big Data, 2017(99): 1–13. doi: 10.1109/TBdata.2017.2656120
    JIANG Tao, CHEN Xiaofeng, WU Qianhong, et al. Secure and efficient cloud data deduplication with randomized tag[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(3): 532–543. doi: 10.1109/TIFS.2016.2622013
    YANG Xue, LU Rongxing, CHOO K K R, et al. Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud[J]. IEEE Transactions on Big Data, 2017(99): 1–12. doi: 10.1109/TBDATA.2017.2721444
    YU Yong, LI Yannan, NI Jianbing, et al. Comments on " public integrity auditing for dynamic data sharing with multiuser modification”[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(3): 658–659. doi: 10.1109/TIFS.2015.2501728
    YANG Guangyuan, YU Jia, SHEN Wenting, et al. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability[J]. Journal of Systems and Software, 2016, 113: 130–139. doi: 10.1016/j.jss.2015.11.044
    SHEN Jian, SHEN Jun, CHEN Xiaofeng, et al. An efficient public auditing protocol with novel dynamic structure for cloud data[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(10): 2402–2415. doi: 10.1109/TIFS.2017.2705620
    YAN Xuewei, MA Hua, LIU Zhenhua, et al. Large universe revocable fine-grained encryption with public auditing [C]. International Conference on Broadband and Wireless Computing, Communication and Applications, Asan, Korea, 2016: 823–830. doi: https://doi.org/10.1007/978-3-319-49106-6_84.
    王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11): 2931–2939. doi: 10.11999/JEIT160064

    WANG Guangbo and WANG Jianhua. Research on cloud storage scheme with attribute-based encryption[J]. Journal of Electronics &Information Technology, 2016, 38(11): 2931–2939. doi: 10.11999/JEIT160064
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)  / Tables(3)

    Article Metrics

    Article views (2057) PDF downloads(93) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return