ase-PoW: A proof of ownership mechanism for cloud deduplication in hierarchical environments

12Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Proof-of-Ownership (PoW) can be an effective deduplication technique to reduce storage requirements, by providing cloud storage servers the capability to guarantee that clients only upload and download files that they are in possession of. In this paper, we propose an attribute symmetric encryption PoW scheme (ase-PoW) for hierarchical environments such as corporations, in which (1) the external cloud service provider is honest-but-curious and (2) there is a flexible access control in place to ensure only users with the right privilege can access sensitive files. This is, to the best of our knowledge, the first such scheme and it is built upon the ce-PoW scheme of González-Manzano and Orfila (2015). ase-PoW outperforms ce-PoW in thaact it does not suffer from content-guessing attacks, it reduces client storage needs and computational workload.

Cite

CITATION STYLE

APA

González-Manzano, L., de Fuentes, J. M., & Choo, K. K. R. (2017). ase-PoW: A proof of ownership mechanism for cloud deduplication in hierarchical environments. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 198 LNICST, pp. 412–428). Springer Verlag. https://doi.org/10.1007/978-3-319-59608-2_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free