Title: Client-side ciphertext deduplication scheme with flexible access control

Authors: Ying Xie; Guohua Tian; Haoran Yuan; Chong Jiang; Jianfeng Wang

Addresses: School of Mathematics and Statistics, Xidian University, Xi'an, 710071, China ' School of Cyber Engineering, Xidian University, Xi'an, 710071, China ' School of Cyber Engineering, Xidian University, Xi'an, 710071, China ' School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, 510006, China ' State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China

Abstract: Data deduplication techniques with fine-grained access control have been applied to realise data sharing while saving the amount of storage space. However, many existing schemes can only achieve server-side deduplication, which greatly wastes the network bandwidth especially when the transmitted data is particularly large. Moreover, few existing schemes consider attribute revocation, in which the forward and backward secrecy cannot be guaranteed. To address the above problems, in this paper, we present a client-side ciphertext deduplication scheme with more flexible access control. Specifically, the data owners are divided into different domains and distributed corresponding domain keys through the secure channel, achieving proof of ownership in client-side deduplication. Besides, attribute revocation is realised through the proxy re-encryption, which need not preset the maximum number of clients in system initialisation phase. Security and performance analysis demonstrate that the proposed scheme can achieve desired security requirements while realising the efficient client-side deduplication and attribute revocation.

Keywords: client-side deduplication; flexible access control; attribute revocation; random tag.

DOI: 10.1504/IJCSE.2020.110537

International Journal of Computational Science and Engineering, 2020 Vol.23 No.2, pp.145 - 157

Received: 31 Aug 2019
Accepted: 12 Jan 2020

Published online: 23 Oct 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article