Projects per year
Deduplication scheme based on convergent encryption (CE) is widely-used in cloud storage system to eliminate redundant data. However, the adversaries can obtain the data by the brute-force attack, if the data belongs to a predictable set for CE. In addition, previous works usually introduce the third-party auditors to execute the data integrity verification, suffering from data disclosure by the auditors. In this paper, we propose a secure authorized deduplication scheme based on blockchain, which can ensure the confidentiality and security of the users' data stored on cloud servers. In our scheme, the users can utilize the smart contract to create a tamper-proofing ledger, which can protect the data from illegal modification. Meanwhile, the users can execute the integrity audit protocols to check the users’ data integrity by the smart contract. Moreover, a hierarchical role hash tree (HRHT) will be constructed to create the role key when the users upload their data to CSP, allowing the authorized users to access the data. Security analysis and performance evaluation demonstrate that our proposed scheme is resilient against the brute-force attack and the collusion attack, while it has limited computation overhead.
Bibliographical noteThis work is supported by the National Natural Science Foundation of China (No. 62076073), the Guangdong Basic and Applied Basic Research Foundation (No. 2020A1515010616), the Guangdong Innovative Research Team Program (No. 2014ZT05G157), the Faculty Research Fund (102041), and the Lam Woo Research Fund (LWI20011) at Lingnan University, Hong Kong.
- Brute-force attack
- Collusion attack
- Convergent encryption