首页 | 本学科首页   官方微博 | 高级检索  
     


Key-exposure resilient integrity auditing scheme with encrypted data deduplication
Authors:Xiangsong ZHANG  Chen LI  Zhenhua LIU
Affiliation:1. School of Science,Xi’an Technological University,Xi’an 710021,China;2. School of Mathematics and Statistics,Xidian University,Xi’an 710071,China
Abstract:For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.
Keywords:cloud storage  integrity auditing  key-exposure resilient  encrypted data  client-side deduplication  
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号