Authors: Jianfeng Wang; Xiaofeng Chen; Jin Li; Kamil Kluczniak; Mirosław Kutyłowski
Addresses: State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, P.R. China ' State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, P.R. China; Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, P.R. China ' School of Computer Science and Educational Software, Guangzhou University, Guangzhou, P.R. China ' Department of Computer Science, Wrocław University of Technology, Wrocław, Poland ' Department of Computer Science, Wrocław University of Technology, Wrocław, Poland
Abstract: Data deduplication is a special type of resource usage optimisation. It leads to reduction of the used storage space and network bandwidth by eliminating duplicate copies of the same data file. Convergent encryption, as the state-of-art approach, has been widely adopted to perform secure deduplication in the cross-user scenario. However, all prior solutions do not support user traceability: there is no way to trace the identities of malicious users in case of duplicate faking attacks. To cope with this problem, we propose a deduplication scheme called TrDup. It realises traceability of malicious user's identity by incorporating traceable signatures with message-locked encryption technique. The TrDup construction is followed by its formal security analysis.
Keywords: message-locked encryption; proof of ownership; secure deduplication; traceable signatures.
International Journal of Web and Grid Services, 2017 Vol.13 No.3, pp.270 - 289
Available online: 03 Jul 2017 *Full-text access for editors Access for subscribers Purchase this article Comment on this article