Secure deduplication for multimedia data with user revocation in cloud storage
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Hyunsoo | - |
dc.contributor.author | Hahn, Changhee | - |
dc.contributor.author | Kim, Daeyoung | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2021-09-03T10:40:49Z | - |
dc.date.available | 2021-09-03T10:40:49Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2017-02 | - |
dc.identifier.issn | 1380-7501 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/84858 | - |
dc.description.abstract | Increment of multimedia data motivates users to utilize cloud storage (CS) to exploit its massive size. For this extensible storage system, there are two desirable requirements: (1) the users should be able to ensure that their outsourced data is securely protected and (2) the cloud service provider should be able to eliminate redundant copies of data for improvement of storage utilization. Conventional encryption scheme does not satisfy the deduplication on ciphertext as it destroys message equality. Recent study, DupLESS, has enhanced Convergent Encryption (CE) and provided strong privacy. However, CE-based scheme allows the users to possibly decrypt cloud data even if the user loses his ownership to the data. In order to solve this problem, we propose a secure deduplication scheme with user revocation. Our scheme leveages oblivious pseudo-random function to generate encryption key. The CS enforces data access policy using privilege-based encryption to provide user revocation. The security analysis proves that the proposed scheme is secure against unauthorized decryption by revoked users or the cloud server, and brute-force attack on predictable set of data. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Secure deduplication for multimedia data with user revocation in cloud storage | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hur, Junbeom | - |
dc.identifier.doi | 10.1007/s11042-015-2595-4 | - |
dc.identifier.scopusid | 2-s2.0-84928150278 | - |
dc.identifier.wosid | 000397020500054 | - |
dc.identifier.bibliographicCitation | MULTIMEDIA TOOLS AND APPLICATIONS, v.76, no.4, pp.5889 - 5903 | - |
dc.relation.isPartOf | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.title | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.volume | 76 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 5889 | - |
dc.citation.endPage | 5903 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | Multimedia big data | - |
dc.subject.keywordAuthor | Deduplication | - |
dc.subject.keywordAuthor | User revocation | - |
dc.subject.keywordAuthor | Cloud computing | - |
dc.subject.keywordAuthor | Access control | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.