Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (6): 195-206.doi: 10.19665/j.issn1001-2400.20230306

• Cyberspace Security • Previous Articles     Next Articles

Encrypted deduplication scheme with access control and key updates

HA Guanxiong1,2(),JIA Qiaowen3(),CHEN Hang1,2(),JIA Chunfu1,2(),LIU Lanqing1,2()   

  1. 1. College of Cyber Science,Nankai University,Tianjin 300350,China
    2. Tianjin Key Laboratory of Network and Data Security Technology,Tianjin 300350,China
    3. Institute of Software,Chinese Academy of Sciences,Beijing 100190,China
  • Received:2022-11-02 Online:2023-12-20 Published:2024-01-22


In the scenario of data outsourcing,access control and key update have an important application value.However,it is hard for existing encrypted deduplication schemes to provide flexible and effective access control and key update for outsourcing user data.To solve this problem,an encrypted deduplication scheme with access control and key updates is proposed.First,an efficient access control scheme for encrypted deduplication is designed based on the ciphertext-policy attribute-based encryption and the proof of ownership.It combines access control with proof of ownership and can simultaneously detect whether a client has the correct access right and whole data content only through a round of interaction between the client and the cloud server,effectively preventing unauthorized access and ownership fraud attacks launched by adversaries.The scheme has features such as low computation overhead and few communication rounds.Second,by combining the design ideas of server-aided encryption and random convergent encryption,an updatable encryption scheme suitable for encrypted deduplication is designed.It is combined with the proposed access control scheme to achieve hierarchical and user-transparent key updates.The results of security analysis and performance evaluation show that the proposed scheme can provide confidentiality and integrity for outsourcing user data while achieving efficient data encryption,decryption,and key update.

Key words: cloud storage, encrypted deduplication, access control, key update, updatable encryption

CLC Number: 

  • TP309