4.7 Article

Cloud storage auditing with deduplication supporting different security levels according to data popularity

Journal

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 134, Issue -, Pages 26-39

Publisher

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2019.02.015

Keywords

Cloud storage auditing; Data deduplication; Semantic security; Data popularity

Funding

  1. National Natural Science Foundation of China [61572267, 61602275]
  2. National Cryptography Development Fund of China [MMJJ20170118]
  3. Open Project of Co-Innovation Center for Information Supply and Assurance Technology, Anhui University
  4. Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, NJUPT [BDSIP1806]
  5. Open Project of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences

Ask authors/readers for more resources

The public cloud storage auditing with deduplication is proposed to check the integrity of cloud data under the condition that the cloud stores only a single copy of the same file from different users. To the best of our knowledge, the existing schemes about cloud storage auditing with deduplication cannot support semantic security for cloud data. The recent data breach incidents have led to an increased demand for the security of encryption schemes. Under the circumstances, we consider to provide different security levels according to the popularity of cloud data. We use the semantic secure encryption to encrypt the unpopular data (private data) to realize semantic security and use convergent encryption to encrypt popular data to realize cipher-text deduplication. However, there exists a big challenge for cloud storage auditing when data popularity changes. Because encryption algorithms are different for popular data and unpopular data, the corresponding ciphertext will have to change once data popularity changes. The old authenticators cannot be valid for the integrity checking any longer after ciphertext changes. In order to overcome this challenge, we explore the numerical relationship between old authenticators and new ones. In our designed scheme, it is not necessary for users to be online for doing extra computation when data popularity changes. The cloud can perform the task of authentications transforming to ensure that the cloud storage auditing still smoothly runs. By detailed security Proof and performance analysis, we show that the proposed scheme is secure and efficient.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available