Netinfo Security ›› 2020, Vol. 20 ›› Issue (3): 75-82.doi: 10.3969/j.issn.1671-1122.2020.03.010

Previous Articles     Next Articles

A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records

ZHANG Yi1, LIU Hongyan1, XIAN Hequn1,2(), TIAN Chengliang1   

  1. 1. College of Computer Science and Technology, Qingdao University, Qingdao 266071, China
    2. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2019-09-20 Online:2020-03-10 Published:2020-05-11

Abstract:

Data deduplication can be used to remove redundant data in cloud storage system, which can improve storage efficiency and save network bandwidth. In order to protect data privacy, cloud users tend to upload data in the form of encrypted ciphertext. However, it makes the data deduplication more difficult. It is a hot issue in cloud computing security filed that how to achieve safe and efficient data deduplication under the premise of ensuring data privacy. This paper proposes a method for deduplication of encrypted data in cloud storage based on authorization records. Based on bilinear mapping, data tag scheme is adopted which is used for duplicate check, and designs an authorization record storage structure. According to the popularity of data, different encryption strategies are applied. We get converted keys by proxy re-encryption. Without any real-time online the third party to participate in, to ensure that the tag does not leak any exploitable information. By implementing the proof of ownership, the security of deduplication data can be ensured. The correctness and security of our scheme are analyzed and proved. The experimental results show the feasibility and efficiency of our scheme.

Key words: authorization record, bilinear mapping, data deduplication, data popularity, proxy re-encryption

CLC Number: