Skip to main content
Log in

RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The explosive growth of global data and the gradual evolution of multimedia processing pattern promote us to enter the era of heterogeneous multimedia data. To improve the storage efficiency and reduce the management expenditure of these massive multimedia data in heterogeneous networks, the direct way is multimedia data deduplication. However, it arises serious privacy concerns and poses new security challenges, such as privacy leakage, the side-channel attack and unauthorized access. To solve these issues, we propose a novel role symmetric encryption (RSE) algorithm and a RSE-based proof of ownership (RSE-PoW) scheme for secure deduplication in hierarchical heterogeneous environments, which is based on the role symmetric encryption, proof of ownership and bloom filter. The proposed scheme is the first solution to prevent the privacy leakage and resist against the side-channel attacks, meanwhile, achieve the authorized deduplication effectively for multimedia data in heterogeneous network. Security analysis and performance evaluation show the security and efficiency of our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Advances in cryptology–EUROCRYPT 2013. Springer, pp 296–312

  2. Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: 2014 IEEE Conference on communications and network security (CNS). IEEE, pp 481–489

  3. Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun Acm 13(7):422–426

    Article  MATH  Google Scholar 

  4. Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security. ACM, pp 81–82

  5. Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forens Secur 12(8):1874–1884

    Article  Google Scholar 

  6. Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559

    Article  Google Scholar 

  7. González-Manzano L, Orfila A (2015) An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50:49–59

    Article  Google Scholar 

  8. Gonzlez-Manzano L, Fuentes JMD, Choo KKR (2016) ase-pow: a proof of ownership mechanism for cloud deduplication in hierarchical environments. In: 2016 12th EAI International conference on security and privacy in communication networks

  9. Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM SIGSAC conference on computer and communications security. ACM, pp 491–500

  10. Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. Secur Priv IEEE 8(6):40–47

    Article  Google Scholar 

  11. Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826–3849

    Article  Google Scholar 

  12. Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:1–1

    Article  Google Scholar 

  13. Kwon H, Hahn C, Kim D, Hur J (2017) Secure deduplication for multimedia data with user revocation in cloud storage. Multimed Tools Appl 76(4):5889–5903

    Article  Google Scholar 

  14. Li J, Li YK, Chen X, Lee P, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216

    Article  Google Scholar 

  15. Li J, Qin C, Lee PPC, Li J (2016) Rekeying for encrypted deduplication storage. In: IEEE/IFIP International conference on dependable systems and networks, pp 618–629

  16. Li J, Qin C, Lee PPC, Zhang X (2017) Information leakage in encrypted deduplication via frequency analysis. In: The 47th Annual IEEE/IFIP International conference on dependable systems and networks

  17. Li Q, Ma J, Li R, Liu X, Xiong J, Chen D (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59(C):45–59

    Article  Google Scholar 

  18. Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437–1448

    Article  Google Scholar 

  19. Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netws 9(17):4002–4012

    Article  Google Scholar 

  20. Liu X, Ma J, Xiong J, Liu G (2014) Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data. Int J Netw Secur 16(4):351–357

    Google Scholar 

  21. Miao M, Wang J, Li H, Chen X (2015) Secure multi-server-aided data deduplication in cloud computing. Perv Mob Comput 24:129–137

    Article  Google Scholar 

  22. Mittal S, Vetter J (2016) A survey of architectural approaches for data compression in cache and main memory systems. IEEE Trans Parallel Distrib Syst 1524–1536

  23. Mo Z, Qiao Y, Chen S (2014) Two-party fine-grained assured deletion of outsourced data in cloud systems. In: IEEE International conference on distributed computing systems, pp 308–317

  24. Pietro RD, Sorniotti A (2016) Proof of ownership for deduplication systems: a secure, scalable, and efficient solution. Comput Commun 82:71–82

    Article  Google Scholar 

  25. Qin C, Li J, Lee PPC (2016) The design and implementation of a rekeying-aware encrypted deduplication storage system. ACM Trans Storage (TOS) 13(1):9

    Google Scholar 

  26. Rabotka V, Mannan M (2015) An evaluation of recent secure deduplication proposals. J Inf Secur Appl

  27. Rashid F, Miri A (2018) Deduplication practices for multimedia data in the cloud. In: Guide to big data applications. Springer International Publishing, pp 245–271

  28. Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forens Secur PP(99):1–1

    Google Scholar 

  29. Storer MW, Greenan K, Long DD, Miller EL (2008) Secure data deduplication. In: Proceedings of the 4th ACM international workshop on storage security and survivability. ACM, pp 1– 10

  30. Su KW, Leu JS, Yu MC, Wu YT, Lee EC, Song T (2017) Design and implementation of various file deduplication schemes on storage devices. Mob Netw Appl 22(1):40–50

    Article  Google Scholar 

  31. Wu D, Liu Q, Wang H, Wu D, Wang R (2017) Social aware energy efficient mobile edge collaboration for video distribution. In: IEEE transaction on multimedia [Preprint Online]. https://doi.org/10.1109/TMM.2017.2733300

  32. Wu D, Yan J, Wang H, Wu D, Wang R (2017) Socially incentive mechanisms for video distribution in device-to-device communications. IEEE Trans Multimed. https://doi.org/10.1109/TWC.2016.2613077, https://doi.org/10.1109/TMM.2017.2692648

  33. Wu D, Yang B, Wang H, Wang C, Wang R (2016) Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks. ACM Trans Multimed Comput Commun Appl 12(4s):60:1–60:19. https://doi.org/10.1145/2978570

    Article  Google Scholar 

  34. Wu D, Yang B, Wang H, Wu D, Wang R (2016) An energy-efficient data forwarding strategy for heterogeneous wbans. IEEE Access 4:7251–7261. https://doi.org/10.1109/ACCESS.2016.2611820

    Article  Google Scholar 

  35. Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y (2016) A comprehensive study of the past, present, and future of data deduplication. Proc IEEE 104(9):1681–1710

    Article  Google Scholar 

  36. Xiong J, Li F, Ma J, Liu X, Yao Z, Chen PS (2015) A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Network Appl 8(6):1025–1037

    Article  Google Scholar 

  37. Xiong J, Zhang Y, Li F, Li S, Ren J, Yao Z (2016) Research progress on secure data deduplication in cloud. J Commun 37(11):169–180

    Google Scholar 

  38. Xiong J, Zhang Y, Lin L, Shen J, Li X, Lin M (2017) ms-posw: a multi-server aided proof of shared ownership scheme for secure deduplication in cloud. In: Concurrency and computation practice and experience [Preprint Online]. https://doi.org/10.1002/cpe.4252

  39. Zhang Y, Xiong J, Lin M, Wang L, Li X (2017) Achieving proof of shared ownership for the shared file in collaborative cloud applications. In: The 3rd international conference on cloud computing and security

  40. Zhang Y, Xiong J, Ren J, Wang L, Lin M (2017) A novel role symmetric encryption algorithm for authorized deduplication in cloud. In: The 10th EAI International conference on mobile multimedia communications

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61402109, 61370078, 61502102 and 61502103); Natural Science Foundation of Fujian Province (2015J05120, 2016J05149, 2017J01737 and 2017J05099); Science and Technology Plan Project of Xi’an (2016CXWL11); Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University) (15008); Distinguished Young Scientific Research Talents Plan in Universities of Fujian Province (2015, 2017).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiqiang Yao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiong, J., Zhang, Y., Li, X. et al. RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data. Mobile Netw Appl 23, 650–663 (2018). https://doi.org/10.1007/s11036-017-0975-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-017-0975-x

Keywords

Navigation