Abstract
The explosive growth of global data and the gradual evolution of multimedia processing pattern promote us to enter the era of heterogeneous multimedia data. To improve the storage efficiency and reduce the management expenditure of these massive multimedia data in heterogeneous networks, the direct way is multimedia data deduplication. However, it arises serious privacy concerns and poses new security challenges, such as privacy leakage, the side-channel attack and unauthorized access. To solve these issues, we propose a novel role symmetric encryption (RSE) algorithm and a RSE-based proof of ownership (RSE-PoW) scheme for secure deduplication in hierarchical heterogeneous environments, which is based on the role symmetric encryption, proof of ownership and bloom filter. The proposed scheme is the first solution to prevent the privacy leakage and resist against the side-channel attacks, meanwhile, achieve the authorized deduplication effectively for multimedia data in heterogeneous network. Security analysis and performance evaluation show the security and efficiency of our proposed scheme.










Similar content being viewed by others
References
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Advances in cryptology–EUROCRYPT 2013. Springer, pp 296–312
Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: 2014 IEEE Conference on communications and network security (CNS). IEEE, pp 481–489
Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun Acm 13(7):422–426
Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security. ACM, pp 81–82
Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forens Secur 12(8):1874–1884
Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559
González-Manzano L, Orfila A (2015) An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50:49–59
Gonzlez-Manzano L, Fuentes JMD, Choo KKR (2016) ase-pow: a proof of ownership mechanism for cloud deduplication in hierarchical environments. In: 2016 12th EAI International conference on security and privacy in communication networks
Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM SIGSAC conference on computer and communications security. ACM, pp 491–500
Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. Secur Priv IEEE 8(6):40–47
Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826–3849
Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:1–1
Kwon H, Hahn C, Kim D, Hur J (2017) Secure deduplication for multimedia data with user revocation in cloud storage. Multimed Tools Appl 76(4):5889–5903
Li J, Li YK, Chen X, Lee P, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216
Li J, Qin C, Lee PPC, Li J (2016) Rekeying for encrypted deduplication storage. In: IEEE/IFIP International conference on dependable systems and networks, pp 618–629
Li J, Qin C, Lee PPC, Zhang X (2017) Information leakage in encrypted deduplication via frequency analysis. In: The 47th Annual IEEE/IFIP International conference on dependable systems and networks
Li Q, Ma J, Li R, Liu X, Xiong J, Chen D (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59(C):45–59
Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437–1448
Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netws 9(17):4002–4012
Liu X, Ma J, Xiong J, Liu G (2014) Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data. Int J Netw Secur 16(4):351–357
Miao M, Wang J, Li H, Chen X (2015) Secure multi-server-aided data deduplication in cloud computing. Perv Mob Comput 24:129–137
Mittal S, Vetter J (2016) A survey of architectural approaches for data compression in cache and main memory systems. IEEE Trans Parallel Distrib Syst 1524–1536
Mo Z, Qiao Y, Chen S (2014) Two-party fine-grained assured deletion of outsourced data in cloud systems. In: IEEE International conference on distributed computing systems, pp 308–317
Pietro RD, Sorniotti A (2016) Proof of ownership for deduplication systems: a secure, scalable, and efficient solution. Comput Commun 82:71–82
Qin C, Li J, Lee PPC (2016) The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Trans Storage (TOS) 13(1):9
Rabotka V, Mannan M (2015) An evaluation of recent secure deduplication proposals. J Inf Secur Appl
Rashid F, Miri A (2018) Deduplication practices for multimedia data in the cloud. In: Guide to big data applications. Springer International Publishing, pp 245–271
Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forens Secur PP(99):1–1
Storer MW, Greenan K, Long DD, Miller EL (2008) Secure data deduplication. In: Proceedings of the 4th ACM international workshop on storage security and survivability. ACM, pp 1– 10
Su KW, Leu JS, Yu MC, Wu YT, Lee EC, Song T (2017) Design and implementation of various file deduplication schemes on storage devices. Mob Netw Appl 22(1):40–50
Wu D, Liu Q, Wang H, Wu D, Wang R (2017) Social aware energy efficient mobile edge collaboration for video distribution. In: IEEE transaction on multimedia [Preprint Online]. https://doi.org/10.1109/TMM.2017.2733300
Wu D, Yan J, Wang H, Wu D, Wang R (2017) Socially incentive mechanisms for video distribution in device-to-device communications. IEEE Trans Multimed. https://doi.org/10.1109/TWC.2016.2613077, https://doi.org/10.1109/TMM.2017.2692648
Wu D, Yang B, Wang H, Wang C, Wang R (2016) Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks. ACM Trans Multimed Comput Commun Appl 12(4s):60:1–60:19. https://doi.org/10.1145/2978570
Wu D, Yang B, Wang H, Wu D, Wang R (2016) An energy-efficient data forwarding strategy for heterogeneous wbans. IEEE Access 4:7251–7261. https://doi.org/10.1109/ACCESS.2016.2611820
Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y (2016) A comprehensive study of the past, present, and future of data deduplication. Proc IEEE 104(9):1681–1710
Xiong J, Li F, Ma J, Liu X, Yao Z, Chen PS (2015) A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Network Appl 8(6):1025–1037
Xiong J, Zhang Y, Li F, Li S, Ren J, Yao Z (2016) Research progress on secure data deduplication in cloud. J Commun 37(11):169–180
Xiong J, Zhang Y, Lin L, Shen J, Li X, Lin M (2017) ms-posw: a multi-server aided proof of shared ownership scheme for secure deduplication in cloud. In: Concurrency and computation practice and experience [Preprint Online]. https://doi.org/10.1002/cpe.4252
Zhang Y, Xiong J, Lin M, Wang L, Li X (2017) Achieving proof of shared ownership for the shared file in collaborative cloud applications. In: The 3rd international conference on cloud computing and security
Zhang Y, Xiong J, Ren J, Wang L, Lin M (2017) A novel role symmetric encryption algorithm for authorized deduplication in cloud. In: The 10th EAI International conference on mobile multimedia communications
Acknowledgments
This work is supported by the National Natural Science Foundation of China (61402109, 61370078, 61502102 and 61502103); Natural Science Foundation of Fujian Province (2015J05120, 2016J05149, 2017J01737 and 2017J05099); Science and Technology Plan Project of Xi’an (2016CXWL11); Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University) (15008); Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province (2015, 2017).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xiong, J., Zhang, Y., Li, X. et al. RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data. Mobile Netw Appl 23, 650–663 (2018). https://doi.org/10.1007/s11036-017-0975-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-017-0975-x