Skip to main content

Fine-Grained Authorized Secure Deduplication with Dynamic Policy

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14509))

  • 692 Accesses

Abstract

Attribute-based encryption (ABE) is a promising technology to provide fine-grained access control for the encrypted data and hence is widely used in the outsourced storage. However, it can not support the secure deduplication for its encryption feature. In order to handle this problem that users with different access policy to the ciphertext of the same plaintext should retrieve this ciphertext normally, we propose a novel ABE scheme supporting fine-grained authorized secure deduplication. Compared with the related works, we consider the dynamic policy update which adapts to the real-world environment more.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bellare, M., Keelveedhi, S.: Interactive message-locked encryption and secure deduplication. Cryptology ePrint Archive (2015)

    Google Scholar 

  2. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_18

    Chapter  Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)

    Google Scholar 

  4. Boneh, D., Lynn, B., Shacham, H.: The stanford paired encryption library. http://crypto.stanford.edu/pbc/ (2007)

  5. Cheng, S., Zeng, S., Zeng, H., Feng, Y., Xiao, J.: Secure single-server fuzzy deduplication without interactive proof-of-ownership in cloud. Cryptology ePrint Archive, Paper 2023/005 (2023). https://eprint.iacr.org/2023/005. https://eprint.iacr.org/2023/005

  6. Cui, H., Deng, R.H., Li, Y., Wu, G.: Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans. Big Data 5(3), 330–342 (2017)

    Article  Google Scholar 

  7. Fugkeaw, S., Sato, H.: Scalable and secure access control policy update for outsourced big data. Futur. Gener. Comput. Syst. 79, 364–373 (2018)

    Article  Google Scholar 

  8. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  9. Joshi, M., Joshi, K., Finin, T.: Attribute based encryption for secure access to cloud based EHR systems. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 932–935. IEEE (2018)

    Google Scholar 

  10. Lai, J., Deng, R.H., Li, Y.: Expressive CP-ABE with partially hidden access structures. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 18–19 (2012)

    Google Scholar 

  11. Lai, J., Deng, R.H., Yang, Y., Weng, J.: Adaptable ciphertext-policy attribute-based encryption. In: Cao, Z., Zhang, F. (eds.) Pairing 2013. LNCS, vol. 8365, pp. 199–214. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04873-4_12

    Chapter  Google Scholar 

  12. Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 874–885 (2015)

    Google Scholar 

  13. Liu, Z., Jiang, Z.L., Wang, X., Yiu, S.M.: Practical attribute-based encryption: outsourcing decryption, attribute revocation and policy updating. J. Netw. Comput. Appl. 108, 112–123 (2018)

    Article  Google Scholar 

  14. Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage (ToS) 7(4), 1–20 (2012)

    Article  Google Scholar 

  15. Premkamal, P.K., Pasupuleti, S.K., Singh, A.K., Alphonse, P.: Enhanced attribute based access control with secure deduplication for big data storage in cloud. Peer-to-Peer Networking Appl. 14, 102–120 (2021)

    Article  Google Scholar 

  16. Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 315–332. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_19

    Chapter  Google Scholar 

  17. Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199–217. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_13

    Chapter  Google Scholar 

  18. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  19. Song, Y., Han, Z., Liu, F., Liu, L.: Attribute-based encryption with hidden policies in the access tree. J. Commun. 36(9), 119–126 (2015)

    Google Scholar 

  20. Yang, K., Jia, X., Ren, K.: Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans. Parallel Distrib. Syst. 26(12), 3461–3470 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shengke Zeng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, J., Zeng, S., Feng, Y., Cheng, S. (2024). Fine-Grained Authorized Secure Deduplication with Dynamic Policy. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9785-5_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9784-8

  • Online ISBN: 978-981-99-9785-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics