Netinfo Security ›› 2017, Vol. 17 ›› Issue (7): 66-72.doi: 10.3969/j.issn.1671-1122.2017.07.010

• Orginal Article • Previous Articles     Next Articles

Research on Encrypted Deduplication Method Based on Offline Key Transfer in Cloud Storage Environment

Shuguang ZHANG1, Hequn XIAN1,2(), Hongyan LIU1, Ruitao HOU1   

  1. 1. College of Computer Science and Technology, Qingdao University, Qingdao Shandong 266071, China
    2. Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2017-06-09 Online:2017-07-20 Published:2020-05-12

Abstract:

Deduplication technology plays an important role in the rapid development of cloud storage. The data that are encrypted has become normal before the user uploading them. Different encryption keys are used to encrypt the same data to obtain different ciphertext, which makes the cloud server unable to realize encrypted deduplication. This paper presents a secure encrypted deduplication scheme that can deliver encryption keys in an offline manner. On the basis of dividing data types, the query tags of data popularity are constructed by using elliptic curve. The secure key transfer scheme is constructed by using the broadcast encryption technology so that the same plaintext is encrypted the same ciphertext, which cloud server can complete the unpopular deduplication. For popular data, the improved convergence encryption algorithm can improve the efficiency of deduplication while ensuring data storage security. Security analysis and simulation results show that the scheme has high security and practicability.

Key words: deduplication, elliptic curve, broadcast encryption, data popularity

CLC Number: