2020
DOI: 10.1155/2020/6662662
|View full text |Cite
|
Sign up to set email alerts
|

Balancing Access Control and Privacy for Data Deduplication via Functional Encryption

Abstract: Data deduplication serves as an effective way to optimize the storage occupation and the bandwidth consumption over clouds. As for the security of deduplication mechanism, users’ privacy and accessibility are of utmost concern since data are outsourced. However, the functionality of redundancy removal and the indistinguishability of deduplication labels are naturally incompatible, which bring about a lot of threats on data security. Besides, the access control of sharing copies may lead to infringement on user… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…However, with the continuous expansion of the network scale, the number of users and data in the cloud computing environment has increased sharply, and users' demand for data, personal privacy, and permission granularity has been increasing. ere is an urgent need to realize fine-grained dynamic authorization for large-scale users; the mode of security requirements has changed from a single user on both sides of the communication to a multiparty communication mode in which at least one party is multiuser, and from "same-domain" communication to "cross-domain" communication, the traditional access control is facing new challenges [7].…”
Section: Introductionmentioning
confidence: 99%
“…However, with the continuous expansion of the network scale, the number of users and data in the cloud computing environment has increased sharply, and users' demand for data, personal privacy, and permission granularity has been increasing. ere is an urgent need to realize fine-grained dynamic authorization for large-scale users; the mode of security requirements has changed from a single user on both sides of the communication to a multiparty communication mode in which at least one party is multiuser, and from "same-domain" communication to "cross-domain" communication, the traditional access control is facing new challenges [7].…”
Section: Introductionmentioning
confidence: 99%