A Cross-Domain Secure Deduplication Scheme Based on Threshold Blind Signature
Autor: | Hui Qi, Xiaoqiang Di, Zhengang Jiang, Jide Deng, Du Jinlei |
---|---|
Rok vydání: | 2020 |
Předmět: |
Key generation
Dictionary attack business.industry Computer science Hash function 020206 networking & telecommunications 02 engineering and technology Encryption Brute-force attack Server Data_FILES 0202 electrical engineering electronic engineering information engineering Data deduplication 020201 artificial intelligence & image processing Key server business Computer network |
Zdroj: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030622046 |
DOI: | 10.1007/978-3-030-62205-3_7 |
Popis: | In the cloud storage environment, client-side deduplication can perform file repetitive detection locally. However, client-side deduplication still faces many security challenges. First, if the file hash value is used as evidence for repetitive detection, the attacker is likely to obtain the entire file information through the hash value of the file. Secondly, in order to protect data privacy, convergence encryption is widely used in the data deduplication scheme. Since the data itself is predictable, convergence encryption is still vulnerable to brute force attacks. In order to solve the above problems, this paper proposes to construct a secure deduplication scheme by using the threshold blind signature method. The generation of the convergence key is coordinated by multiple key servers, ensuring the confidentiality of the convergence key and effectively solving the violent dictionary attack problem. At the same time, since the key center is introduced to centrally manage the keys, the interaction between the key servers is reduced, and the key generation efficiency is improved. In addition, since the key server in this paper can be distributed in multiple independent network domains and interact with the key center through the Internet, the problem of cross-domain deduplication is solved. The experimental results show that the performance of this scheme is greatly improved in terms of system initialization and key generation. |
Databáze: | OpenAIRE |
Externí odkaz: |