2019
DOI: 10.1109/access.2019.2920998
|View full text |Cite
|
Sign up to set email alerts
|

Secure Encrypted Data With Authorized Deduplication in Cloud

Abstract: In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and satisfies the dynamic privilege updating and revoking. Meanwhile, our system supports ownership checking and achieves the proof of ownership for the authorized users efficiently. Specifically, we introduce a management center to handle with the authorized request … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 47 publications
(64 reference statements)
0
21
0
Order By: Relevance
“…e ongoing work targets the application extensions of our research methodology from regenerating-coding-based storage to privacy-preserving forwarding [21], security-asservice frameworks [22], mobile crowdsensing [23,24], authorized deduplication [25,26], and the adoption of a stronger threat model involving malware detection [16,18,27]. Security and Communication Networks…”
Section: Discussionmentioning
confidence: 99%
“…e ongoing work targets the application extensions of our research methodology from regenerating-coding-based storage to privacy-preserving forwarding [21], security-asservice frameworks [22], mobile crowdsensing [23,24], authorized deduplication [25,26], and the adoption of a stronger threat model involving malware detection [16,18,27]. Security and Communication Networks…”
Section: Discussionmentioning
confidence: 99%
“…In the related works discussed above, most of the schemes rely on a online trusted third party as in Xiong's sheme [23],Wang's scheme [30], et al Some of the schemes achieved dynamic ownership update, but their using of public key encryption or re-encryption caused significant overhead to the process. In this paper, we propose a secure encrypted data deduplication scheme named SecDedup, which not only achieves deduplicaion of encrypted data without any online third party, but also allows dynamic update of data ownership in a lightweight manner.…”
Section: Discussionmentioning
confidence: 99%
“…We assume that the CSP is honest but curious, i.e., it correctly performs the system operations, but will try to explore data content [23]. To some extent, the interests of users and CSP conflict with each other, as users require efficiency while the CSP always seeks ways to reduce storage costs.…”
Section: Adversary Modelmentioning
confidence: 99%
“…Yan et al [33] designed a heterogeneous data management scheme supporting both deduplication and access control simultaneously. By constructing a role authorized tree, Xiong et al [31] designed a secure encrypted data deduplication scheme, in which only the authorized user is able to access the specific file. Cui et al [4] proposed an attribute-based encrypted data deduplication scheme in the cloud.…”
Section: A Related Work 1) Secure Deduplicationmentioning
confidence: 99%