효율적인 재암호화를 지원하는 안전한 클라이언트 측 중복제거
- Alternative Title
- Secure Client-side Deduplication Supporting Efficient Re-encryption
- Abstract
- Cloud storage is a service that rents remote storage to users over the Internet. The service is highly demanded because it provides advantages such as high accessibility, low installation and opeating costs. However, because many users store data in cloud storage, the probability of duplicate data being stored is high. Therefore, it is necessary to apply deduplication techniques to improve storage efficiency. Among the deduplication techniques, the client-side deduplication achieves superiority in storage and network bandwidth efficiency as it uploads the data after checking whether the duplicate data is stored or not.
However, previously proposed client-side deduplication techniques have three weaknesses. First, in the case of the existing data duplication check, it has no access control to users that do not accord with the data access attributes. Through the duplication check, therefore, anyone can find if the data being queried has been stored on the cloud server. Consequently, the data duplication check without access control can be a threat to the privacy of data. Secondly, in the previously proposed Proof-of-Ownership(PoW) technique using Merkle Tree, it creates a data structure that verifies that you are the user who owns the actual data. The user who owns the actual data passes the verification through the challenge-response protocol. However, it is vulnerable to man-in-the-middle attack since Merkle Tree based scheme uses static response values in verification protocols. Meanwhile, the data is stored on the cloud storage in an encrypted form for data confidentiality. In this case, re-encryption may be required when the encryption key is exposed or when an user requests deletion of the data. The previously proposed re-encryption techniques in cloud storage, however, require high computational overhead, mainly using bilinear pairing operation to generate re-encryption key.
Therefore, this thesis proposes a model that overcomes the disadvantages of existing client-side deduplication. Firstly, in order to prevent exposure of data privacy that may occur during data duplication check, an attribute tag is added together with a data tag so that the result of the data duplication check can be known only to a legitimate user with appropriate data access attributes. The attribute tag of the user used here expresses the attribute of the user by using a counting bloom filter and it is used as a value to encrypt the challenge in the PoW process. Next, in order to prevent threats of the man-in-the-middle attacks to which the PoW technique using the existing Merkle Tree is exposed, the query to be requested is transfromed into a legitimate form, instead of being sent directly, so that the attacker cannot know the answer corresponding to the query. Finally, the proposed scheme uses PRE(Proxy Re-Encryption) based on symmetric encryption in order to perform an efficient re-encryption in terms of computational complexity.
- Author(s)
- 김동이
- Issued Date
- 2018
- Awarded Date
- 2018.2
- Type
- Dissertation
- Publisher
- 부경대학교
- URI
- https://repository.pknu.ac.kr:8443/handle/2021.oak/14260
http://pknu.dcollection.net/common/orgView/200000010708
- Alternative Author(s)
- Dong-Ee Kim
- Affiliation
- 부경대학교 대학원
- Department
- 대학원 정보보호학협동과정
- Advisor
- 신상욱
- Table Of Contents
- I. 서 론 1
1. 연구배경 1
2. 연구 내용 및 구성 4
Ⅱ. 관련 연구 5
1. 클라이언트 측 중복 제거 5
2. 소유권 증명 6
3. 재암호화 7
Ⅲ. 효율적인 재암호화를 지원하는 안전한 중복 제거 8
1. 시스템 모델 8
2. 제안 모델의 세부 프로토콜 21
3. 분석 32
Ⅳ. 결 론 37
참고 문헌 39
- Degree
- Master
-
Appears in Collections:
- 대학원 > 정보보호학협동과정
- Authorize & License
-
- Files in This Item:
-
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.