Font Size: a A A

Research On Cross-user Data Deduplication Over Encrypted Data

Posted on:2022-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:X R JiangFull Text:PDF
GTID:2518306509984899Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Deduplication technology is widely used in applications such as cloud computing services to optimize their storage performance.Deduplication technology means that when the cloud service provider receives different copies of a same file uploaded by different users,the cloud server provider only stores one copy of the same file.In order to protect the privacy of data,users usually choose to encrypt the data before uploading them to the cloud service provider.However,users using traditional encryption algorithms to encrypt data may cause the same data to be encrypted into different ciphertext,which prevents the cloud server from performing deduplication.A secure cross-user data deduplication over encrypted data not only guarantees the privacy of data,but also allows cloud service providers to realize duplicate data detection without knowing the plaintext data.This paper addresses the security issues in cross-user deduplication over encrypted data without the assistance of a third-party entity(e.g.,additional cloud servers or assistance from other entities),which realizes secure and user-friendly deduplication.The proposed scheme introduces a random value in the generation stage of the convergence key to resist brute-force dictionary attacks,and uses the El Gamal encryption algorithm to encrypt it and share it with users who have different copies of the same data through the cloud server.On the basis of solving the security problem of cross-user deduplication over encrypted data,this paper combines secure cross-user deduplication technology with practical applications,and proposes a solution for large enterprises or groups.This solution is based on a hybrid cloud architecture and implements secure access control as well as key management through the ciphertext-policy attribute-based encryption algorithm(CP-ABE).Security analysis shows that the two proposed solutions in this paper guarantee the security requirements in the field of cross-user deduplication over encrypted data.In addition,this paper designs a large number of comparative experiments and simulation experiments,and the experimental results show that in the proposed schemes,the complex calculation work is performed by the cloud server,and the user only needs to undertake a small amount of work.
Keywords/Search Tags:deduplication, convergent encryption, access control, data privacy
PDF Full Text Request
Related items