Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities

2017 ◽  
Vol 41 ◽  
pp. 243-258 ◽  
Author(s):  
Chao Yang ◽  
Mingyue Zhang ◽  
Qi Jiang ◽  
Junwei Zhang ◽  
Danping Li ◽  
...  
Information ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 142
Author(s):  
Weijing You ◽  
Lei Lei ◽  
Bo Chen ◽  
Limin Liu

By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problematic as encryption performed by different data owners may differentiate identical data which may then become not deduplicable. The Message-Locked Encryption (MLE) is thus utilized to derive the same encryption key for the identical data, by which the encrypted data are still deduplicable after being encrypted by different data owners. As keys may be leaked over time, re-encrypting outsourced data is of paramount importance to ensure continuous confidentiality, which, however, has not been well addressed in the literature. In this paper, we design SEDER, a SEcure client-side Deduplication system enabling Efficient Re-encryption for cloud storage by (1) leveraging all-or-nothing transform (AONT), (2) designing a new delegated re-encryption (DRE), and (3) proposing a new proof of ownership scheme for encrypted cloud data (PoWC). Security analysis and experimental evaluation validate security and efficiency of SEDER, respectively.


2017 ◽  
Vol 30 (16) ◽  
pp. e3324 ◽  
Author(s):  
Laicheng Cao ◽  
Wenwen He ◽  
Yufei Liu ◽  
Xian Guo ◽  
Tao Feng

Author(s):  
Navya Gouru ◽  
NagaLakshmi Vadlamani

The redesign of cloud storage with the amalgamation of cooperative cloud and an immutable and unhackable distributed database blockchain thrives towards a strong CIA triad and secured data provenance. The conspiracy ideology associated with the traditional cloud has economized with cooperative cloud storage like Storj and Sia, decentralized storage, which allows renting the unused hard drive space and getting monetary compensation in an exchange with cryptocurrency. In this article, the authors explain how confidentiality, integrity and availability can be progressed with cooperative cloud storage along with tamper-proof data provenance management with ethereum smart contracts using zero-knowledge proof (ZKP). A contemporary architecture is proposed with regards to storing data on the cooperative cloud and collecting and verifying the provenance data from the cloud and publishing the provenance data into blockchain network as transactions.


Author(s):  
M A Manazir Ahsan ◽  
Ihsan Ali ◽  
Muhammad Imran ◽  
Mohd. Yamani Idna Idris ◽  
Suleman Khan ◽  
...  

2017 ◽  
pp. 197-219 ◽  
Author(s):  
Surya Nepal ◽  
Shiping Chen ◽  
Jinhui Yao

Sign in / Sign up

Export Citation Format

Share Document