z-logo
Premium
ms‐PoSW: A multi‐server aided proof of shared ownership scheme for secure deduplication in cloud
Author(s) -
Xiong Jinbo,
Zhang Yuanyuan,
Lin Li,
Shen Jian,
Li Xuan,
Lin Mingwei
Publication year - 2017
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4252
Subject(s) - data deduplication , computer science , bloom filter , cloud computing , construct (python library) , secret sharing , scheme (mathematics) , data sharing , computer security , cloud storage , encryption , computer network , cryptography , operating system , medicine , mathematical analysis , alternative medicine , mathematics , pathology
Summary Collaborative cloud applications have become the dominant application mode in the big data era. These applications usually generate plenty of cooperative files, which share their ownerships with all collaborative participants. Data deduplication is a promising solution to improve the storage efficiency and save the user expenditure. However, it remains an open issue on how to securely prove the shared ownerships for the shared files and address the attacks on account of using data deduplication. To tackle the above issue, in this paper, we introduce a novel concept of the Proof of Shared oWnership (PoSW) and construct a secure multi‐server‐aided PoSW (ms‐PoSW) scheme for securing client‐side deduplication for the shared files, which is based on the convergent encryption, secret sharing, and bloom filter. In the ms‐PoSW scheme, we employ a sharing convergent key to avoid the single point of failure, introduce the secret sharing algorithm to implement the shared ownership, and construct a novel interaction protocol between the shared owners and the cloud server to prove the shared ownership. Furthermore, a hybrid PoSW scheme is constructed to address the secure proof of hybrid cloud architectures. Finally, security analysis and performance evaluation show the security and efficiency of the proposed schemes.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here