About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Mobile Wireless Middleware, Operating Systems and Applications. 9th EAI International Conference, MOBILWARE 2020, Hohhot, China, July 11, 2020, Proceedings

Research Article

A Cross-Domain Secure Deduplication Scheme Based on Threshold Blind Signature

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-62205-3_7,
        author={Jinlei Du and Jide Deng and Hui Qi and Xiaoqiang Di and Zhengang Jiang},
        title={A Cross-Domain Secure Deduplication Scheme Based on Threshold Blind Signature},
        proceedings={Mobile Wireless Middleware, Operating Systems and Applications. 9th EAI International Conference, MOBILWARE 2020, Hohhot, China, July 11, 2020, Proceedings},
        proceedings_a={MOBILWARE},
        year={2020},
        month={11},
        keywords={Secure deduplication Encryption Threshold blind signature Cross-domain secure deduplication},
        doi={10.1007/978-3-030-62205-3_7}
    }
    
  • Jinlei Du
    Jide Deng
    Hui Qi
    Xiaoqiang Di
    Zhengang Jiang
    Year: 2020
    A Cross-Domain Secure Deduplication Scheme Based on Threshold Blind Signature
    MOBILWARE
    Springer
    DOI: 10.1007/978-3-030-62205-3_7
Jinlei Du1, Jide Deng1, Hui Qi1,*, Xiaoqiang Di1, Zhengang Jiang2
  • 1: Jilin Key Laboratory of Network and Information Security
  • 2: School of Computer Science and Technology
*Contact email: qihui@cust.edu.cn

Abstract

In the cloud storage environment, client-side deduplication can perform file repetitive detection locally. However, client-side deduplication still faces many security challenges. First, if the file hash value is used as evidence for repetitive detection, the attacker is likely to obtain the entire file information through the hash value of the file. Secondly, in order to protect data privacy, convergence encryption is widely used in the data deduplication scheme. Since the data itself is predictable, convergence encryption is still vulnerable to brute force attacks. In order to solve the above problems, this paper proposes to construct a secure deduplication scheme by using the threshold blind signature method. The generation of the convergence key is coordinated by multiple key servers, ensuring the confidentiality of the convergence key and effectively solving the violent dictionary attack problem. At the same time, since the key center is introduced to centrally manage the keys, the interaction between the key servers is reduced, and the key generation efficiency is improved. In addition, since the key server in this paper can be distributed in multiple independent network domains and interact with the key center through the Internet, the problem of cross-domain deduplication is solved. The experimental results show that the performance of this scheme is greatly improved in terms of system initialization and key generation.

Keywords
Secure deduplication Encryption Threshold blind signature Cross-domain secure deduplication
Published
2020-11-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-62205-3_7
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL