Skip to main content

Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10602))

Included in the following conference series:

Abstract

Collaborative cloud applications are increasingly popular in our daily life, and generate plenty of cooperative files. The ownerships of these files are jointly shared by all participants. However, it is still a challenge to keep secure access and storage to those shared files, while ensuring the cloud storage efficiency. To tackle this problem, in this paper, we formalize a novel notion called Proof of Shared oWnership (PoSW), and propose a specific PoSW scheme to implement both secure ownership verification and data deduplication. In the PoSW scheme, we employ the convergent encryption algorithm to protect the content confidentiality of the shared file, introduce the secret file dispersal and secret sharing algorithm to implement the shared authorization and file ownership, and construct a novel interaction protocol between the file owners and the cloud server to verify the shared ownership and achieve deduplication to the shared file. Security analysis and performance evaluation show the security and efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38348-9_18

    Chapter  Google Scholar 

  2. Blasco, J., Di Pietro, R., Orfila, A., et al.: A tunable proof of ownership scheme for deduplication using bloom filters. In: IEEE CNS, pp. 481–489. IEEE (2014)

    Google Scholar 

  3. Chen, R., Mu, Y., Yang, G., et al.: Bl-mle: Block-level message-locked encryption for secure large file deduplication. IEEE TIFS 10(12), 2643–2652 (2015)

    Google Scholar 

  4. Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ACM CCS, pp. 81–82. ACM (2012)

    Google Scholar 

  5. Fu, Z., Huang, F., Sun, X., et al.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. In: IEEE TSC (2016)

    Google Scholar 

  6. Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE TIFS 11(12), 2706–2716 (2016)

    Google Scholar 

  7. González-Manzano, L., Orfila, A.: An efficient confidentiality-preserving proof of ownership for deduplication. JNCA 50, 49–59 (2015)

    Article  Google Scholar 

  8. Halevi, S., Harnik, D., Pinkas, B., et al.: Proofs of ownership in remote storage systems. In: ACM CCS, pp. 491–500. ACM (2011)

    Google Scholar 

  9. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE S&P 8(6), 40–47 (2010)

    Google Scholar 

  10. Jiang, T., Chen, X., Wu, Q., et al.: Secure and efficient cloud data deduplication with randomized tag. IEEE TIFS PP(99), 1 (2016)

    Google Scholar 

  11. Li, J., Li, J., Xie, D., et al.: Secure auditing and deduplicating data in cloud. IEEE TC 65(8), 2386–2396 (2016)

    MATH  MathSciNet  Google Scholar 

  12. Li, J., Qin, C., Lee, P.P.C., et al.: Information leakage in encrypted deduplication via frequency analysis. In: IEEE/IFIP DSN (2017)

    Google Scholar 

  13. Li, Q., Ma, J., Li, R., et al.: Large universe decentralized key-policy attribute-based encryption. SCN 8(3), 501–509 (2015)

    Google Scholar 

  14. Li, Q., Ma, J., Li, R., et al.: Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. SCN 8(18), 4098–4109 (2015)

    Google Scholar 

  15. Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: ACM CCS, pp. 874–885. ACM (2015)

    Google Scholar 

  16. Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. SCN 9(17), 4002–4012 (2016)

    Google Scholar 

  17. Soriente, C., Karame, G.O., Ritzdorf, H., et al.: Commune: shared ownership in an agnostic cloud. In: ACM SACMAT, pp. 39–50. ACM (2015)

    Google Scholar 

  18. Storer, M.W., Greenan, K., Long, D.D., et al.: Secure data deduplication. In: ACM IWSS, pp. 1–10. ACM (2008)

    Google Scholar 

  19. Tang, B., Sandhu, R., Li, Q.: Multi-tenancy authorization models for collaborative cloud services. CCPE 27(11), 2851–2868 (2015)

    Google Scholar 

  20. Wu, D., Yang, B., Wang, H., et al.: Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks. ACM TMCCA 12(4), 60:1–60:19 (2016)

    Google Scholar 

  21. Xiong, J., Li, F., Ma, J., et al.: A full lifecycle privacy protection scheme for sensitive data in cloud computing. P2PNA 8(6), 1025–1037 (2015)

    Google Scholar 

  22. Xiong, J., Zhang, Y., Li, F., et al.: Research progress on secure data deduplication in cloud. J. Commun. 37(11), 169–180 (2016)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61402109, 61370078, 61502102 and 61502103); Natural Science Foundation of Fujian Province (2015J05120, 2016J05149, 2017J01737 and 2017J05099); Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University) (15008); Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province (2015, 2017).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinbo Xiong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Y., Xiong, J., Lin, M., Wang, L., Li, X. (2017). Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10602. Springer, Cham. https://doi.org/10.1007/978-3-319-68505-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68505-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68504-5

  • Online ISBN: 978-3-319-68505-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics