Abstract
Collaborative cloud applications are increasingly popular in our daily life, and generate plenty of cooperative files. The ownerships of these files are jointly shared by all participants. However, it is still a challenge to keep secure access and storage to those shared files, while ensuring the cloud storage efficiency. To tackle this problem, in this paper, we formalize a novel notion called Proof of Shared oWnership (PoSW), and propose a specific PoSW scheme to implement both secure ownership verification and data deduplication. In the PoSW scheme, we employ the convergent encryption algorithm to protect the content confidentiality of the shared file, introduce the secret file dispersal and secret sharing algorithm to implement the shared authorization and file ownership, and construct a novel interaction protocol between the file owners and the cloud server to verify the shared ownership and achieve deduplication to the shared file. Security analysis and performance evaluation show the security and efficiency of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38348-9_18
Blasco, J., Di Pietro, R., Orfila, A., et al.: A tunable proof of ownership scheme for deduplication using bloom filters. In: IEEE CNS, pp. 481–489. IEEE (2014)
Chen, R., Mu, Y., Yang, G., et al.: Bl-mle: Block-level message-locked encryption for secure large file deduplication. IEEE TIFS 10(12), 2643–2652 (2015)
Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ACM CCS, pp. 81–82. ACM (2012)
Fu, Z., Huang, F., Sun, X., et al.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. In: IEEE TSC (2016)
Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE TIFS 11(12), 2706–2716 (2016)
González-Manzano, L., Orfila, A.: An efficient confidentiality-preserving proof of ownership for deduplication. JNCA 50, 49–59 (2015)
Halevi, S., Harnik, D., Pinkas, B., et al.: Proofs of ownership in remote storage systems. In: ACM CCS, pp. 491–500. ACM (2011)
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE S&P 8(6), 40–47 (2010)
Jiang, T., Chen, X., Wu, Q., et al.: Secure and efficient cloud data deduplication with randomized tag. IEEE TIFS PP(99), 1 (2016)
Li, J., Li, J., Xie, D., et al.: Secure auditing and deduplicating data in cloud. IEEE TC 65(8), 2386–2396 (2016)
Li, J., Qin, C., Lee, P.P.C., et al.: Information leakage in encrypted deduplication via frequency analysis. In: IEEE/IFIP DSN (2017)
Li, Q., Ma, J., Li, R., et al.: Large universe decentralized key-policy attribute-based encryption. SCN 8(3), 501–509 (2015)
Li, Q., Ma, J., Li, R., et al.: Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. SCN 8(18), 4098–4109 (2015)
Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: ACM CCS, pp. 874–885. ACM (2015)
Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. SCN 9(17), 4002–4012 (2016)
Soriente, C., Karame, G.O., Ritzdorf, H., et al.: Commune: shared ownership in an agnostic cloud. In: ACM SACMAT, pp. 39–50. ACM (2015)
Storer, M.W., Greenan, K., Long, D.D., et al.: Secure data deduplication. In: ACM IWSS, pp. 1–10. ACM (2008)
Tang, B., Sandhu, R., Li, Q.: Multi-tenancy authorization models for collaborative cloud services. CCPE 27(11), 2851–2868 (2015)
Wu, D., Yang, B., Wang, H., et al.: Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks. ACM TMCCA 12(4), 60:1–60:19 (2016)
Xiong, J., Li, F., Ma, J., et al.: A full lifecycle privacy protection scheme for sensitive data in cloud computing. P2PNA 8(6), 1025–1037 (2015)
Xiong, J., Zhang, Y., Li, F., et al.: Research progress on secure data deduplication in cloud. J. Commun. 37(11), 169–180 (2016)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (61402109, 61370078, 61502102 and 61502103); Natural Science Foundation of Fujian Province (2015J05120, 2016J05149, 2017J01737 and 2017J05099); Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University) (15008); Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province (2015, 2017).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhang, Y., Xiong, J., Lin, M., Wang, L., Li, X. (2017). Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10602. Springer, Cham. https://doi.org/10.1007/978-3-319-68505-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-68505-2_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68504-5
Online ISBN: 978-3-319-68505-2
eBook Packages: Computer ScienceComputer Science (R0)