Block level cloud data deduplication scheme based on attribute encryption

Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing wa...

Full description

Saved in:
Bibliographic Details
Main Authors: Wenting GE, Weihai LI, Nenghai YU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023066
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529615845163008
author Wenting GE
Weihai LI
Nenghai YU
author_facet Wenting GE
Weihai LI
Nenghai YU
author_sort Wenting GE
collection DOAJ
description Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.
format Article
id doaj-art-736389cf9aaf4a9e9e917490f3081c92
institution Kabale University
issn 2096-109X
language English
publishDate 2023-10-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-736389cf9aaf4a9e9e917490f3081c922025-01-15T03:17:00ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-10-01910611559581368Block level cloud data deduplication scheme based on attribute encryptionWenting GEWeihai LINenghai YUDue to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023066deduplicationcloud storageattribute-based-encryptionproof of ownershiplinear secret sharing scheme
spellingShingle Wenting GE
Weihai LI
Nenghai YU
Block level cloud data deduplication scheme based on attribute encryption
网络与信息安全学报
deduplication
cloud storage
attribute-based-encryption
proof of ownership
linear secret sharing scheme
title Block level cloud data deduplication scheme based on attribute encryption
title_full Block level cloud data deduplication scheme based on attribute encryption
title_fullStr Block level cloud data deduplication scheme based on attribute encryption
title_full_unstemmed Block level cloud data deduplication scheme based on attribute encryption
title_short Block level cloud data deduplication scheme based on attribute encryption
title_sort block level cloud data deduplication scheme based on attribute encryption
topic deduplication
cloud storage
attribute-based-encryption
proof of ownership
linear secret sharing scheme
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023066
work_keys_str_mv AT wentingge blocklevelclouddatadeduplicationschemebasedonattributeencryption
AT weihaili blocklevelclouddatadeduplicationschemebasedonattributeencryption
AT nenghaiyu blocklevelclouddatadeduplicationschemebasedonattributeencryption