LEVER: secure deduplicated cloud storage with encrypted two-party interactions in cyber - physical systems

Zahra Pooranian*, Mohammad Shojafar, Sahil Garg, Rahim Taheri, Rahim Tafazolli

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Cloud envisioned cyber - physical systems (CCPS) is a practical technology that relies on the interaction among cyber elements like mobile users to transfer data in cloud computing. In CCPS, cloud storage applies data deduplication techniques aiming to save data storage and bandwidth for real-time services. In this infrastructure, data deduplication eliminates duplicate data to increase the performance of the CCPS application. However, it incurs security threats and privacy risks. For example, the encryption from independent users with different keys is not compatible with data deduplication. In this area, several types of research have been done. Nevertheless, they are suffering from a lack of security, high performance, and applicability. Motivated by this, in this article, we propose a message lock encryption with neVer-decrypt homomorphic encRyption (LEVER) protocol between the uploading CCPS user and cloud storage to reconcile the encryption and data deduplication. Interestingly, LEVER is the first brute-force resilient encrypted deduplication with only cryptographic two-party interactions. We perform several numerical analysis of LEVER and confirm that it provides high performance and practicality compared to the literature.

Original languageEnglish
Article number9184090
Pages (from-to)5759-5768
Number of pages10
JournalIEEE Transactions on Industrial Informatics
Volume17
Issue number8
Early online date3 May 2021
DOIs
Publication statusPublished - 1 Aug 2021

Keywords

  • Cloud envisioned cyber - physical systems (CCPS)
  • cloud storage
  • data deduplication
  • homomorphic encryption
  • Internet of Things (IoT)
  • privacy

Fingerprint

Dive into the research topics of 'LEVER: secure deduplicated cloud storage with encrypted two-party interactions in cyber - physical systems'. Together they form a unique fingerprint.

Cite this