Publication:
ase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environments

dc.affiliation.dptoUC3M. Departamento de Informáticaes
dc.affiliation.grupoinvUC3M. Grupo de Investigación: COSEC (Computer SECurity Lab)es
dc.contributor.authorGonzález Manzano, Lorena
dc.contributor.authorFuentes García-Romero de Tejada, José María de
dc.contributor.authorChoo, Kim-Kwang Raymond
dc.date.accessioned2018-03-15T15:49:23Z
dc.date.available2018-03-15T15:49:23Z
dc.date.issued2016-10-10
dc.description.abstractProof-of-Ownership (PoW) can be an efective deduplication technique to reduce storage requirements, by providing cloud storage servers the capability to guarantee that clients only upload and download files that they are in possession of. In this paper, we propose an attribute symmetric encryption PoW scheme (ase-PoW) for hierarchical environments such as corporations, in which (1) the external cloud service provider is honest-but-curious and (2) there is a exible access control in place to ensure only users with the right privilege can access sensitive files. This is, to the best of our knowledge, the first such scheme and it is built upon the ce-PoW scheme of Gonzalez-Manzano and Orfila (2015). Ase-PoW outperforms ce-PoW in that it does not suffer from content-guessing attacks, it reduces client storage needs and computational workload.en
dc.description.sponsorshipThis work was partially supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You) and the CAM grant S2013/ICE-3095 CIBERDINE-CM (CIBERDINE: Cybersecurity, Data, and Risks) funded by Madrid Autonomous Community and co-funded by European funds. L. Gonzalez and J. M. de Fuentes were also supported by the Programa de Ayudas para la Movilidad of Carlos III University of Madrid, Spain.en
dc.format.mimetypeapplication/pdf
dc.identifier.bibliographicCitationProceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm) , Security and Privacy in Communication Networks, 2016, Guangzhou, China, October 10-12, 2016, pp 412-428
dc.identifier.doihttps://doi.org/10.1007/978-3-319-59608-2_24
dc.identifier.isbn978-3-319-59608-2
dc.identifier.issn1867-8211
dc.identifier.publicationfirstpage412es
dc.identifier.publicationlastpage428es
dc.identifier.publicationtitleSecurity and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedingsen
dc.identifier.publicationvolume198
dc.identifier.urihttps://hdl.handle.net/10016/26126
dc.identifier.uxxiCC/0000026197
dc.language.isoeng
dc.publisherSpringer International Publishing
dc.relation.eventdate2016-10-10
dc.relation.eventplaceChina
dc.relation.eventtitle12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
dc.relation.ispartofseriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series
dc.relation.projectIDGobierno de España. TIN2013-46469-R/SPINY
dc.relation.projectIDComunidad de Madrid. S2013/ICE-3095/CIBERDINE
dc.rights© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017
dc.rights.accessRightsopen access
dc.subject.ecienciaInformáticaes
dc.subject.otherDeduplication techniqueen
dc.subject.otherProof of ownershipen
dc.subject.otherSymmetric Encryptionen
dc.subject.otherAccess-controlen
dc.titlease-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environmentsen
dc.typeconference proceedings*
dc.type.hasVersionAM*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
asepow_SPCN_2017_ps.pdf
Size:
703.91 KB
Format:
Adobe Portable Document Format