| 注册
首页|期刊导航|密码学报|无可信第三方的加密重复数据安全删除方法

无可信第三方的加密重复数据安全删除方法

张曙光 咸鹤群 王利明 刘红燕 侯瑞涛

密码学报2018,Vol.5Issue(3):286-296,11.
密码学报2018,Vol.5Issue(3):286-296,11.DOI:10.13868/j.cnki.jcr.000239

无可信第三方的加密重复数据安全删除方法

Security Deduplication Method of Encrypted Data Without Any Additional Server

张曙光 1咸鹤群 2王利明 3刘红燕 1侯瑞涛2

作者信息

  • 1. 青岛大学 计算机科学技术学院,青岛266071
  • 2. 桂林电子科技大学 广西密码学与信息安全重点实验室,桂林541004
  • 3. 中国科学院 信息工程研究所 信息安全国家重点实验室,北京100093
  • 折叠

摘要

Abstract

Deduplication has been widely used in public cloud services. This technology means that only one copy of the same data is stored in the cloud. If there is a duplicate copy, the cloud deduplicates it and creates a link for the uploader to access the initial data copy. The same data hold the same Hash value which makes deduplication of plaintext data much simpler. However, in order to protect data privacy, most users choose to use a private key to encrypt data and then outsource to the cloud. Due to the diversity of user keys, a same plaintext may be encrypted into different ciphertexts, and the cloud cannot perform deduplication in this case. Most existing solutions rely on third-party servers, resulting in their low security and execution efficiency. This study proposes a deduplication scheme that does not require trusted third parties. A password authentication key exchange protocol and the bilinear mapping are used to build an encryption data redundancy identification algorithm to securely verify whether different encrypted data originate from the same plaintext data. The homomorphic encryption algorithm is adopted to design the secure encryption key deliver algorithm, in which the initial uploader can safely deliver the encryption key to the subsequent uploader via the cloud. Users with the same data are able to obtain the same encryption key, and the cloud server can achieve the deduplication of encrypted data. Security analysis and performance evaluation shows the scheme's high security and implementation efficiency.

关键词

重复数据删除/口令认证密钥交换协议/双线性映射/同态加密/数据流行度

Key words

deduplication/password authentication key exchange/bilinear mapping/homomorphic encryption/popularity of data

分类

信息技术与安全科学

引用本文复制引用

张曙光,咸鹤群,王利明,刘红燕,侯瑞涛..无可信第三方的加密重复数据安全删除方法[J].密码学报,2018,5(3):286-296,11.

基金项目

国家自然科学基金(61303197) (61303197)

广西密码学与信息安全重点实验室研究课题(GCIS201722) (GCIS201722)

National Natural Science Foundation of China (61303197) (61303197)

Fund of Guangxi Key Laboratory of Cryp-tography and Information Security (GCIS201722) (GCIS201722)

密码学报

OACSCDCSTPCD

2095-7025

访问量0
|
下载量0
段落导航相关论文