Key-exposure resilient integrity auditing scheme with encrypted data deduplication |
| |
Authors: | Xiangsong ZHANG Chen LI Zhenhua LIU |
| |
Affiliation: | 1. School of Science,Xi’an Technological University,Xi’an 710021,China;2. School of Mathematics and Statistics,Xidian University,Xi’an 710071,China |
| |
Abstract: | For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model. |
| |
Keywords: | cloud storage integrity auditing key-exposure resilient encrypted data client-side deduplication |
|
| 点击此处可从《通信学报》浏览原始摘要信息 |
|
点击此处可从《通信学报》下载全文 |
|