Skip to main content
Erschienen in: Mobile Networks and Applications 3/2018

02.12.2017

RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data

verfasst von: Jinbo Xiong, Yuanyuan Zhang, Xuan Li, Mingwei Lin, Zhiqiang Yao, Guangjun Liu

Erschienen in: Mobile Networks and Applications | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The explosive growth of global data and the gradual evolution of multimedia processing pattern promote us to enter the era of heterogeneous multimedia data. To improve the storage efficiency and reduce the management expenditure of these massive multimedia data in heterogeneous networks, the direct way is multimedia data deduplication. However, it arises serious privacy concerns and poses new security challenges, such as privacy leakage, the side-channel attack and unauthorized access. To solve these issues, we propose a novel role symmetric encryption (RSE) algorithm and a RSE-based proof of ownership (RSE-PoW) scheme for secure deduplication in hierarchical heterogeneous environments, which is based on the role symmetric encryption, proof of ownership and bloom filter. The proposed scheme is the first solution to prevent the privacy leakage and resist against the side-channel attacks, meanwhile, achieve the authorized deduplication effectively for multimedia data in heterogeneous network. Security analysis and performance evaluation show the security and efficiency of our proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Advances in cryptology–EUROCRYPT 2013. Springer, pp 296–312 Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Advances in cryptology–EUROCRYPT 2013. Springer, pp 296–312
2.
Zurück zum Zitat Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: 2014 IEEE Conference on communications and network security (CNS). IEEE, pp 481–489 Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: 2014 IEEE Conference on communications and network security (CNS). IEEE, pp 481–489
3.
Zurück zum Zitat Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun Acm 13(7):422–426CrossRefMATH Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun Acm 13(7):422–426CrossRefMATH
4.
Zurück zum Zitat Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security. ACM, pp 81–82 Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security. ACM, pp 81–82
5.
Zurück zum Zitat Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forens Secur 12(8):1874–1884CrossRef Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forens Secur 12(8):1874–1884CrossRef
6.
Zurück zum Zitat Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559CrossRef Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559CrossRef
7.
Zurück zum Zitat González-Manzano L, Orfila A (2015) An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50:49–59CrossRef González-Manzano L, Orfila A (2015) An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50:49–59CrossRef
8.
Zurück zum Zitat Gonzlez-Manzano L, Fuentes JMD, Choo KKR (2016) ase-pow: a proof of ownership mechanism for cloud deduplication in hierarchical environments. In: 2016 12th EAI International conference on security and privacy in communication networks Gonzlez-Manzano L, Fuentes JMD, Choo KKR (2016) ase-pow: a proof of ownership mechanism for cloud deduplication in hierarchical environments. In: 2016 12th EAI International conference on security and privacy in communication networks
9.
Zurück zum Zitat Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM SIGSAC conference on computer and communications security. ACM, pp 491–500 Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM SIGSAC conference on computer and communications security. ACM, pp 491–500
10.
Zurück zum Zitat Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. Secur Priv IEEE 8(6):40–47CrossRef Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. Secur Priv IEEE 8(6):40–47CrossRef
11.
Zurück zum Zitat Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826–3849CrossRef Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826–3849CrossRef
12.
Zurück zum Zitat Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:1–1CrossRef Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:1–1CrossRef
13.
Zurück zum Zitat Kwon H, Hahn C, Kim D, Hur J (2017) Secure deduplication for multimedia data with user revocation in cloud storage. Multimed Tools Appl 76(4):5889–5903CrossRef Kwon H, Hahn C, Kim D, Hur J (2017) Secure deduplication for multimedia data with user revocation in cloud storage. Multimed Tools Appl 76(4):5889–5903CrossRef
14.
Zurück zum Zitat Li J, Li YK, Chen X, Lee P, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216CrossRef Li J, Li YK, Chen X, Lee P, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216CrossRef
15.
Zurück zum Zitat Li J, Qin C, Lee PPC, Li J (2016) Rekeying for encrypted deduplication storage. In: IEEE/IFIP International conference on dependable systems and networks, pp 618–629 Li J, Qin C, Lee PPC, Li J (2016) Rekeying for encrypted deduplication storage. In: IEEE/IFIP International conference on dependable systems and networks, pp 618–629
16.
Zurück zum Zitat Li J, Qin C, Lee PPC, Zhang X (2017) Information leakage in encrypted deduplication via frequency analysis. In: The 47th Annual IEEE/IFIP International conference on dependable systems and networks Li J, Qin C, Lee PPC, Zhang X (2017) Information leakage in encrypted deduplication via frequency analysis. In: The 47th Annual IEEE/IFIP International conference on dependable systems and networks
17.
Zurück zum Zitat Li Q, Ma J, Li R, Liu X, Xiong J, Chen D (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59(C):45–59CrossRef Li Q, Ma J, Li R, Liu X, Xiong J, Chen D (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59(C):45–59CrossRef
18.
Zurück zum Zitat Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437–1448CrossRef Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437–1448CrossRef
19.
Zurück zum Zitat Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netws 9(17):4002–4012CrossRef Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netws 9(17):4002–4012CrossRef
20.
Zurück zum Zitat Liu X, Ma J, Xiong J, Liu G (2014) Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data. Int J Netw Secur 16(4):351–357 Liu X, Ma J, Xiong J, Liu G (2014) Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data. Int J Netw Secur 16(4):351–357
21.
Zurück zum Zitat Miao M, Wang J, Li H, Chen X (2015) Secure multi-server-aided data deduplication in cloud computing. Perv Mob Comput 24:129–137CrossRef Miao M, Wang J, Li H, Chen X (2015) Secure multi-server-aided data deduplication in cloud computing. Perv Mob Comput 24:129–137CrossRef
22.
Zurück zum Zitat Mittal S, Vetter J (2016) A survey of architectural approaches for data compression in cache and main memory systems. IEEE Trans Parallel Distrib Syst 1524–1536 Mittal S, Vetter J (2016) A survey of architectural approaches for data compression in cache and main memory systems. IEEE Trans Parallel Distrib Syst 1524–1536
23.
Zurück zum Zitat Mo Z, Qiao Y, Chen S (2014) Two-party fine-grained assured deletion of outsourced data in cloud systems. In: IEEE International conference on distributed computing systems, pp 308–317 Mo Z, Qiao Y, Chen S (2014) Two-party fine-grained assured deletion of outsourced data in cloud systems. In: IEEE International conference on distributed computing systems, pp 308–317
24.
Zurück zum Zitat Pietro RD, Sorniotti A (2016) Proof of ownership for deduplication systems: a secure, scalable, and efficient solution. Comput Commun 82:71–82CrossRef Pietro RD, Sorniotti A (2016) Proof of ownership for deduplication systems: a secure, scalable, and efficient solution. Comput Commun 82:71–82CrossRef
25.
Zurück zum Zitat Qin C, Li J, Lee PPC (2016) The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Trans Storage (TOS) 13(1):9 Qin C, Li J, Lee PPC (2016) The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Trans Storage (TOS) 13(1):9
26.
Zurück zum Zitat Rabotka V, Mannan M (2015) An evaluation of recent secure deduplication proposals. J Inf Secur Appl Rabotka V, Mannan M (2015) An evaluation of recent secure deduplication proposals. J Inf Secur Appl
27.
Zurück zum Zitat Rashid F, Miri A (2018) Deduplication practices for multimedia data in the cloud. In: Guide to big data applications. Springer International Publishing, pp 245–271 Rashid F, Miri A (2018) Deduplication practices for multimedia data in the cloud. In: Guide to big data applications. Springer International Publishing, pp 245–271
28.
Zurück zum Zitat Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forens Secur PP(99):1–1 Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forens Secur PP(99):1–1
29.
Zurück zum Zitat Storer MW, Greenan K, Long DD, Miller EL (2008) Secure data deduplication. In: Proceedings of the 4th ACM international workshop on storage security and survivability. ACM, pp 1– 10 Storer MW, Greenan K, Long DD, Miller EL (2008) Secure data deduplication. In: Proceedings of the 4th ACM international workshop on storage security and survivability. ACM, pp 1– 10
30.
Zurück zum Zitat Su KW, Leu JS, Yu MC, Wu YT, Lee EC, Song T (2017) Design and implementation of various file deduplication schemes on storage devices. Mob Netw Appl 22(1):40–50CrossRef Su KW, Leu JS, Yu MC, Wu YT, Lee EC, Song T (2017) Design and implementation of various file deduplication schemes on storage devices. Mob Netw Appl 22(1):40–50CrossRef
35.
Zurück zum Zitat Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y (2016) A comprehensive study of the past, present, and future of data deduplication. Proc IEEE 104(9):1681–1710CrossRef Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y (2016) A comprehensive study of the past, present, and future of data deduplication. Proc IEEE 104(9):1681–1710CrossRef
36.
Zurück zum Zitat Xiong J, Li F, Ma J, Liu X, Yao Z, Chen PS (2015) A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Network Appl 8(6):1025–1037CrossRef Xiong J, Li F, Ma J, Liu X, Yao Z, Chen PS (2015) A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Network Appl 8(6):1025–1037CrossRef
37.
Zurück zum Zitat Xiong J, Zhang Y, Li F, Li S, Ren J, Yao Z (2016) Research progress on secure data deduplication in cloud. J Commun 37(11):169–180 Xiong J, Zhang Y, Li F, Li S, Ren J, Yao Z (2016) Research progress on secure data deduplication in cloud. J Commun 37(11):169–180
38.
Zurück zum Zitat Xiong J, Zhang Y, Lin L, Shen J, Li X, Lin M (2017) ms-posw: a multi-server aided proof of shared ownership scheme for secure deduplication in cloud. In: Concurrency and computation practice and experience [Preprint Online]. https://doi.org/10.1002/cpe.4252 Xiong J, Zhang Y, Lin L, Shen J, Li X, Lin M (2017) ms-posw: a multi-server aided proof of shared ownership scheme for secure deduplication in cloud. In: Concurrency and computation practice and experience [Preprint Online]. https://​doi.​org/​10.​1002/​cpe.​4252
39.
Zurück zum Zitat Zhang Y, Xiong J, Lin M, Wang L, Li X (2017) Achieving proof of shared ownership for the shared file in collaborative cloud applications. In: The 3rd international conference on cloud computing and security Zhang Y, Xiong J, Lin M, Wang L, Li X (2017) Achieving proof of shared ownership for the shared file in collaborative cloud applications. In: The 3rd international conference on cloud computing and security
40.
Zurück zum Zitat Zhang Y, Xiong J, Ren J, Wang L, Lin M (2017) A novel role symmetric encryption algorithm for authorized deduplication in cloud. In: The 10th EAI International conference on mobile multimedia communications Zhang Y, Xiong J, Ren J, Wang L, Lin M (2017) A novel role symmetric encryption algorithm for authorized deduplication in cloud. In: The 10th EAI International conference on mobile multimedia communications
Metadaten
Titel
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data
verfasst von
Jinbo Xiong
Yuanyuan Zhang
Xuan Li
Mingwei Lin
Zhiqiang Yao
Guangjun Liu
Publikationsdatum
02.12.2017
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 3/2018
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-017-0975-x

Weitere Artikel der Ausgabe 3/2018

Mobile Networks and Applications 3/2018 Zur Ausgabe

Neuer Inhalt