González Manzano, LorenaFuentes García-Romero de Tejada, José María deChoo, Kim-Kwang Raymond2018-03-152018-03-152016-10-10Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm) , Security and Privacy in Communication Networks, 2016, Guangzhou, China, October 10-12, 2016, pp 412-428978-3-319-59608-21867-8211https://hdl.handle.net/10016/26126Proof-of-Ownership (PoW) can be an efective deduplication technique to reduce storage requirements, by providing cloud storage servers the capability to guarantee that clients only upload and download files that they are in possession of. In this paper, we propose an attribute symmetric encryption PoW scheme (ase-PoW) for hierarchical environments such as corporations, in which (1) the external cloud service provider is honest-but-curious and (2) there is a exible access control in place to ensure only users with the right privilege can access sensitive files. This is, to the best of our knowledge, the first such scheme and it is built upon the ce-PoW scheme of Gonzalez-Manzano and Orfila (2015). Ase-PoW outperforms ce-PoW in that it does not suffer from content-guessing attacks, it reduces client storage needs and computational workload.application/pdfeng© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017Deduplication techniqueProof of ownershipSymmetric EncryptionAccess-controlase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environmentsconference proceedingsInformáticahttps://doi.org/10.1007/978-3-319-59608-2_24open access412428Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings198CC/0000026197