Publication: ase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environments
dc.affiliation.dpto | UC3M. Departamento de Informática | es |
dc.affiliation.grupoinv | UC3M. Grupo de Investigación: COSEC (Computer SECurity Lab) | es |
dc.contributor.author | González Manzano, Lorena | |
dc.contributor.author | Fuentes García-Romero de Tejada, José María de | |
dc.contributor.author | Choo, Kim-Kwang Raymond | |
dc.date.accessioned | 2018-03-15T15:49:23Z | |
dc.date.available | 2018-03-15T15:49:23Z | |
dc.date.issued | 2016-10-10 | |
dc.description.abstract | Proof-of-Ownership (PoW) can be an efective deduplication technique to reduce storage requirements, by providing cloud storage servers the capability to guarantee that clients only upload and download files that they are in possession of. In this paper, we propose an attribute symmetric encryption PoW scheme (ase-PoW) for hierarchical environments such as corporations, in which (1) the external cloud service provider is honest-but-curious and (2) there is a exible access control in place to ensure only users with the right privilege can access sensitive files. This is, to the best of our knowledge, the first such scheme and it is built upon the ce-PoW scheme of Gonzalez-Manzano and Orfila (2015). Ase-PoW outperforms ce-PoW in that it does not suffer from content-guessing attacks, it reduces client storage needs and computational workload. | en |
dc.description.sponsorship | This work was partially supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You) and the CAM grant S2013/ICE-3095 CIBERDINE-CM (CIBERDINE: Cybersecurity, Data, and Risks) funded by Madrid Autonomous Community and co-funded by European funds. L. Gonzalez and J. M. de Fuentes were also supported by the Programa de Ayudas para la Movilidad of Carlos III University of Madrid, Spain. | en |
dc.format.mimetype | application/pdf | |
dc.identifier.bibliographicCitation | Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm) , Security and Privacy in Communication Networks, 2016, Guangzhou, China, October 10-12, 2016, pp 412-428 | |
dc.identifier.doi | https://doi.org/10.1007/978-3-319-59608-2_24 | |
dc.identifier.isbn | 978-3-319-59608-2 | |
dc.identifier.issn | 1867-8211 | |
dc.identifier.publicationfirstpage | 412 | es |
dc.identifier.publicationlastpage | 428 | es |
dc.identifier.publicationtitle | Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings | en |
dc.identifier.publicationvolume | 198 | |
dc.identifier.uri | https://hdl.handle.net/10016/26126 | |
dc.identifier.uxxi | CC/0000026197 | |
dc.language.iso | eng | |
dc.publisher | Springer International Publishing | |
dc.relation.eventdate | 2016-10-10 | |
dc.relation.eventplace | China | |
dc.relation.eventtitle | 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm) | |
dc.relation.ispartofseries | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series | |
dc.relation.projectID | Gobierno de España. TIN2013-46469-R/SPINY | |
dc.relation.projectID | Comunidad de Madrid. S2013/ICE-3095/CIBERDINE | |
dc.rights | © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017 | |
dc.rights.accessRights | open access | |
dc.subject.eciencia | Informática | es |
dc.subject.other | Deduplication technique | en |
dc.subject.other | Proof of ownership | en |
dc.subject.other | Symmetric Encryption | en |
dc.subject.other | Access-control | en |
dc.title | ase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environments | en |
dc.type | conference proceedings | * |
dc.type.hasVersion | AM | * |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1