ZTE Communications ›› 2021, Vol. 19 ›› Issue (2): 67-76.doi: 10.12142/ZTECOM.202102009
• Research Paper • Previous Articles Next Articles
ZHAO Tian1, LI Hui1(), YANG Xin1, WANG Han1, ZENG Ming2, GUO Haisheng2, WANG Dezheng2
Received:
2021-01-13
Online:
2021-06-25
Published:
2021-07-27
About author:
ZHAO Tian is a postgraduate of the Shenzhen Graduate School, Peking University, China. His main research directions are big data applications, blockchain, and distributed storage.|LI Hui (Supported by:
ZHAO Tian, LI Hui, YANG Xin, WANG Han, ZENG Ming, GUO Haisheng, WANG Dezheng. Differentially Authorized Deduplication System Based on Blockchain[J]. ZTE Communications, 2021, 19(2): 67-76.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
Table 1
Parameters and their description"
Parameter | Description |
---|---|
TFL | Time required for file label generation |
TCE | Time it takes for the file or data block to convergent encryption |
TFT | File transfer time |
TPQ | Time required for blockchain permission query |
TOE | Time required for outer encryption |
TGB | Time required to generate a block |
TA | Total time |
TAE | Enhancement plan total time |
1 |
HARNIK D, PINKAS B, SHULMAN⁃PELEG A. Side channels in cloud services: Deduplication in cloud storage [J]. IEEE security & privacy, 2010, 8(6): 40–47. DOI: 10.1109/MSP.2010.187
doi: 10.1109/MSP.2010.187 |
2 |
DOUCEUR J R, ADYA A, BOLOSKY W J, et al. Reclaiming space from duplicate files in a serverless distributed file system [C]//22nd International Conference on Distributed Computing Systems. Vienna, Austria: IEEE, 2002: 617–624. DOI: 10.1109/ICDCS.2002.1022312
doi: 10.1109/ICDCS.2002.1022312 |
3 |
LIU J, ASOKAN N, PINKAS B. Secure deduplication of encrypted data without additional independent servers [C]//22nd ACM SIGSAC Conference on Computer and Communications Security. Denver, USA: ACM, 2015: 874–885. DOI: 10.1145/2810103.2813623
doi: 10.1145/2810103.2813623 |
4 |
LIU X F, SUN W H, LOU W J, et al. One⁃tag checker: message⁃locked integrity auditing on encrypted cloud deduplication storage [C]//IEEE Conference on Computer Communications (INFOCOM). Atlanta, USA: IEEE, 2017: 1–9. DOI: 10.1109/INFOCOM.2017.8056999
doi: 10.1109/INFOCOM.2017.8056999 |
5 |
BELLARE M, KEELVEEDHI S, RISTENPART T. Message⁃locked encryption and secure deduplication [C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques: Berlin/Heidelberg, Germany: Springer, 2013: 296–312. DOI: 10.1007/978-3-642-38348-9_18
doi: 10.1007/978-3-642-38348-9_18 |
6 |
PUZIO P, MOLVA R, ÖNEN M, et al. ClouDedup: secure deduplication with encrypted data for cloud storage [C]//5th International Conference on Cloud Computing Technology and Science. Bristol, UK: IEEE, 2013: 363–370. DOI: 10.1109/CloudCom.2013.54
doi: 10.1109/CloudCom.2013.54 |
7 | KEELVEEDHI S, BELLARE M, RISTENPART T. Dupless: server⁃aided encryption for deduplicated storage [C]//22nd USENIX Conference on Security. Washington D. C., USA: USENIX, 2013: 179–194 |
8 |
LI J, CHEN X F, HUANG X Y, et al. Secure distributed deduplication systems with improved reliability [J]. IEEE transactions on computers, 2015, 64(12): 3569–3579. DOI: 10.1109/TC.2015.2401017
doi: 10.1109/TC.2015.2401017 |
9 | NAKAMOTO S. Bitcoin: a peer⁃to⁃peer electronic cash system [EB/OL]. (2008⁃10⁃31)[2020⁃01⁃01]. |
10 |
KHALIL R, GERVAIS A. Revive: rebalancing off⁃blockchain payment networks [C]//ACM SIGSAC Conference on Computer and Communications Security. Dallas, USA: ACM, 2017: 439–453. DOI: 10.1145/3133956.3134033
doi: 10.1145/3133956.3134033 |
11 |
BHATTACHARYA R, WHITE M, BELOFF N. A blockchain based peer⁃to⁃peer framework for exchanging leftover foreign currency [C]//Computing Conference. London, UK: IEEE, 2017: 1431–1435. DOI: 10.1109/SAI.2017.8252284
doi: 10.1109/SAI.2017.8252284 |
12 |
HALEVI S, HARNIK D, PINKAS B, et al. Proofs of ownership in remote storage systems [C]//18th ACM Conference on Computer and Communications Security. Chicago, USA: ACM, 2011: 491–500. DOI: 10.1145/2046707.2046765
doi: 10.1145/2046707.2046765 |
13 |
GERVAIS A, KARAME G O, WÜST K, et al. On the security and performance of proof of work blockchains [C]//ACM SIGSAC Conference on Computer and Communications Security. Vienna, Austria: ACM, 2016: 3–16. DOI: 10.1145/2976749.2978341
doi: 10.1145/2976749.2978341 |
14 |
EYAL I, SIRER E G. Majority is not enough: Bitcoin mining is vulnerable [C]//International Conference on Financial Cryptography and Data Security. Berlin/Heidelberg, Germany: Springer, 2014: 436–454. DOI: 10.1007/978-3-662-45472-5_28
doi: 10.1007/978-3-662-45472-5_28 |
15 |
KIAYIAS A, RUSSELL A, DAVID B, et al. Ouroboros: a provably secure proof⁃of⁃stake blockchain protocol [C]//Advances in Cryptology—CRYPTO 2017, Cham, Switzerland: Springer, 2017: 357–388. DOI: 10.1007/978-3-319-63688-7_12
doi: 10.1007/978-3-319-63688-7_12 |
16 |
LI W T, ANDREINA S, BOHLI J M, et al. Securing proof⁃of⁃stake blockchain protocols [C]//Data privacy management, cryptocurrencies and blockchain technology. Cham, Switzerland: Springer, 2017: 297–315. DOI: 10.1007/978-3-319-67816-0_17
doi: 10.1007/978-3-319-67816-0_17 |
17 |
ZHENG Z B, XIE S A, DAI H N, et al. An overview of blockchain technology: Architecture, consensus, and future trends [C]//International Congress on Big Data (BigData Congress). Honolulu, USA: IEEE, 2017: 557–564. DOI: 10.1109/BigDataCongress.2017.85
doi: 10.1109/BigDataCongress.2017.85 |
18 |
SANKAR L S, SINDHU M, SETHUMADHAVAN M. Survey of consensus protocols on blockchain applications [C]//4th International Conference on Advanced Computing and Communication Systems (ICACCS). Coimbatore, India: IEEE, 2017: 1–5. DOI: 10.1109/ICACCS.2017.8014672
doi: 10.1109/ICACCS.2017.8014672 |
19 |
LI K J, LI H, WANG H, et al. PoV: an efficient voting⁃based consensus algorithm for consortium blockchains [J]. Frontiers in blockchain, 2020, 3: 11DOI: 10.3389/fbloc.2020.00011
doi: 10.3389/fbloc.2020.00011 |
20 |
LI J, CHEN X F, LI M Q, et al. Secure deduplication with efficient and reliable convergent key management [J]. IEEE transactions on parallel and distributed systems, 2014, 25(6): 1615–1625. DOI: 10.1109/TPDS.2013.284
doi: 10.1109/TPDS.2013.284 |
21 | KAHATE A. Cryptography and network security [M]. New Delhi, India: Tata McGraw⁃Hill Education, 2013 |
[1] | LIN Xinhua, ZHANG Jing, LI Qiang. Cluster Head Selection Algorithm for UAV Assisted Clustered IoT Network Utilizing Blockchain [J]. ZTE Communications, 2021, 19(1): 30-38. |
[2] | XING Kaixuan, LI Hui, YIN Feng, MA Huajun, HOU Hanxu, XU Huanle, HAN Yunghsiang S., LIU Ji, SUN Tao. Prototype of Multi-Identifier SystemBased on Voting Consensus [J]. ZTE Communications, 2020, 18(1): 7-17. |
[3] | ZUO Chunxue, WANG Fang, TANG Xiaolan, ZHANG Yucheng, FENG Dan. SRSC: Improving Restore Performance for Deduplication-Based Storage Systems [J]. ZTE Communications, 2019, 17(2): 59-66. |
[4] | LEI Ao, Chibueze Ogah, Philip Asuquo, Haitham Cruickshank, SUN Zhili. A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems [J]. ZTE Communications, 2016, 14(S0): 21-31. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||