Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Secure deduplication for multimedia data with user revocation in cloud storage

Full metadata record
DC Field Value Language
dc.contributor.authorKwon, Hyunsoo-
dc.contributor.authorHahn, Changhee-
dc.contributor.authorKim, Daeyoung-
dc.contributor.authorHur, Junbeom-
dc.date.accessioned2021-09-03T10:40:49Z-
dc.date.available2021-09-03T10:40:49Z-
dc.date.created2021-06-16-
dc.date.issued2017-02-
dc.identifier.issn1380-7501-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/84858-
dc.description.abstractIncrement of multimedia data motivates users to utilize cloud storage (CS) to exploit its massive size. For this extensible storage system, there are two desirable requirements: (1) the users should be able to ensure that their outsourced data is securely protected and (2) the cloud service provider should be able to eliminate redundant copies of data for improvement of storage utilization. Conventional encryption scheme does not satisfy the deduplication on ciphertext as it destroys message equality. Recent study, DupLESS, has enhanced Convergent Encryption (CE) and provided strong privacy. However, CE-based scheme allows the users to possibly decrypt cloud data even if the user loses his ownership to the data. In order to solve this problem, we propose a secure deduplication scheme with user revocation. Our scheme leveages oblivious pseudo-random function to generate encryption key. The CS enforces data access policy using privilege-based encryption to provide user revocation. The security analysis proves that the proposed scheme is secure against unauthorized decryption by revoked users or the cloud server, and brute-force attack on predictable set of data.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleSecure deduplication for multimedia data with user revocation in cloud storage-
dc.typeArticle-
dc.contributor.affiliatedAuthorHur, Junbeom-
dc.identifier.doi10.1007/s11042-015-2595-4-
dc.identifier.scopusid2-s2.0-84928150278-
dc.identifier.wosid000397020500054-
dc.identifier.bibliographicCitationMULTIMEDIA TOOLS AND APPLICATIONS, v.76, no.4, pp.5889 - 5903-
dc.relation.isPartOfMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.titleMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.volume76-
dc.citation.number4-
dc.citation.startPage5889-
dc.citation.endPage5903-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorMultimedia big data-
dc.subject.keywordAuthorDeduplication-
dc.subject.keywordAuthorUser revocation-
dc.subject.keywordAuthorCloud computing-
dc.subject.keywordAuthorAccess control-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE