860
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Blockchain-assisted data sharing supports deduplication for cloud storage

, &
Article: 2174081 | Received 27 Nov 2022, Accepted 25 Jan 2023, Published online: 11 Feb 2023

References

  • Bethencourt, J., Sahai, A., & Waters, B. (2007, May 20–23). Ciphertext-policy attribute-based encryption. 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA.
  • Cheung, L., & Newport, C. (2007, November 2). Provably secure ciphertext policy ABE. 14th ACM Conference on Computer and Communications Security 2007, Alexandria Virginia, USA.
  • Cui, H., Deng, R. H., Li, Y., & Qin, B. (2016, September 26–30). Server-aided revocable attribute-based encryption. Computer Security–ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece.
  • Deebak, B., Memon, F. H., Khowaja, S. A., Dev, K., Wang, W., Qureshi, N. M. F., & Su, C. (2022). Lightweight blockchain based remote mutual authentication for AI-empowered IoT sustainable computing systems. IEEE Internet of Things Journal, 1(2022), 1–1. https://doi.org/10.1109/JIOT.2022.3152546
  • Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., & Fang, L. (2021a). Revocable attribute-based encryption with data integrity in clouds. IEEE Transactions on Dependable and Secure Computing, 19(5), 2864–2872. https://doi.org/10.1109/TDSC.2021.3065999
  • Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., & Fang, L. (2021b). A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing, 19(5), 2907–2919. https://doi.org/10.1109/TDSC.2021.3076580
  • Green, M., Hohenberger, S., & Waters, B. (2011, August 8–12). Outsourcing the decryption of abe ciphertexts. USENIX security symposium, San Francisco, CA.
  • Hohenberger, S., & Waters, B. (2014, March 26–28). Online/offline attribute-based encryption. Public-Key Cryptography–PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina.
  • Jammula, M., Vakamulla, V. M., & Kondoju, S. K. (2022). Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system. Connection Science, 34(1), 2431–2447. https://doi.org/10.1080/09540091.2022.2124957
  • Li, J., Jia, C., Li, J., & Chen, X. (2012, October 29–31). Outsourcing encryption of attribute-based encryption with mapreduce. Information and Communications Security: 14th International Conference, Hong Kong, China.
  • Li, J., Sha, F., Zhang, Y., Huang, X., & Shen, J. (2017). Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Security and Communication Networks, 2017(2017), 1–11. https://doi.org/10.1155/2017/3596205
  • Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2020). A survey on the security of blockchain systems. Future Generation Computer Systems, 107(2020), 841–853. https://doi.org/10.1016/j.future.2017.08.020
  • Liu, S., Yu, J., Xiao, Y., Wan, Z., Wang, S., & Yan, B. (2020). BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet of Things Journal, 7(9), 7851–7867. https://doi.org/10.1109/JIoT.6488907
  • Ma, H., Xie, Y., Wang, J., Tian, G., & Liu, Z. (2019). Revocable attribute-based encryption scheme with efficient deduplication for ehealth systems. IEEE Access, 7(2019), 89205–89217. https://doi.org/10.1109/Access.6287639
  • Ma, J., Li, T., Cui, J., Ying, Z., & Cheng, J. (2021). Attribute-based secure announcement sharing among vehicles using blockchain. IEEE Internet of Things Journal, 8(13), 10873–10883. https://doi.org/10.1109/JIOT.2021.3050802
  • Qin, B., Deng, R. H., Liu, S., & Ma, S. (2015). Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 10(7), 1384–1393. https://doi.org/10.1109/TIFS.2015.2410137
  • Rahulamathavan, Y., Phan, R. C. W., Rajarajan, M., Misra, S., & Kondoz, A. (2017, December 17–20). Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India.
  • Rouselakis, Y., & Waters, B. (2013, November 4–8). Practical constructions and new proof methods for large universe attribute-based encryption. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin.
  • Sahai, A., & Waters, B. (2005, May 22–26). Fuzzy identity-based encryption. Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.
  • Tu, S., Waqas, M., Huang, F., Abbas, G., & Abbas, Z. H. (2021). A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Computer Networks, 195(2021), Article 108196. https://doi.org/10.1016/j.comnet.2021.108196
  • Wang, C., Shen, J., Lai, J. F., & Liu, J. (2020). B-TSCA: Blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs. IEEE Transactions on Emerging Topics in Computing, 9(3), 1386–1396. https://doi.org/10.1109/TETC.2020.2978866
  • Wang, C., Zhou, T., Shen, J., Wang, W., & Zhou, X. (2023). Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems. Future Generation Computer Systems, 140(2023), 129–137. https://doi.org/10.1016/j.future.2022.10.012
  • Wang, H., & Song, Y. (2018). Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. Journal of Medical Systems, 42(8), 1–9. https://doi.org/10.1007/s10916-018-0994-6
  • Wang, W., Yang, Y., Yin, Z., Dev, K., Zhou, X., Li, X., Qureshi, N. M. F., & Su, C. (2022). BSIF: Blockchain-based secure, interactive, and fair Mobile crowdsensing. IEEE Journal on Selected Areas in Communications, 40(12), 3452–3469. https://doi.org/10.1109/JSAC.2022.3213306
  • Wu, Z., Huang, H., Zhou, Y., & Wu, C. (2022). A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain. Connection Science, 34(1), 1999–2025. https://doi.org/10.1080/09540091.2022.2090514
  • Xiao, M., Li, H., Huang, Q., Yu, S., & Susilo, W. (2022). Attribute-based hierarchical access control with extendable policy. IEEE Transactions on Information Forensics and Security, 17(2022), 1868–1883. https://doi.org/10.1109/TIFS.2022.3173412
  • Xu, R., Joshi, J., & Krishnamurthy, P. (2019). An integrated privacy preserving attribute-based access control framework supporting secure deduplication. IEEE Transactions on Dependable and Secure Computing, 18(2), 706–721. https://doi.org/10.1109/TDSC.8858
  • Yang, H., Shen, J., Lu, J., Zhou, T., Xia, X., & Ji, S. (2021). A privacy-preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare. Security and Communication Networks, 2021(2021), 1–12. https://doi.org/10.1155/2021/5781354
  • Yang, X., & Zhang, C. (2022). Blockchain-based multiple authorities attribute-based encryption for EHR access control scheme. Applied Sciences, 12(21), 10812. https://doi.org/10.3390/app122110812
  • Zhang, L., You, W., & Mu, Y. (2021). Secure outsourced attribute-based sharing framework for lightweight devices in smart health systems. IEEE Transactions on Services Computing, 15(5), 3019–3030. https://doi.org/10.1109/TSC.2021.3073740
  • Zhang, L., Zou, Y., Yousuf, M. H., Wang, W., Jin, Z., Su, Y., & Kim, S. (2022). BDSS: Blockchain-based data sharing scheme with fine-grained access control and permission revocation in medical environment. KSII Transactions on Internet and Information Systems (TIIS), 16(5), 1634–1652. https://doi.org/10.3837/tiis.2022.05.012
  • Zhang, T., Shen, J., Lai, C. F., Ji, S., & Ren, Y. (2023). Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems. Future Generation Computer Systems, 140(2023), 299–310. https://doi.org/10.1016/j.future.2022.10.031
  • Zhang, T., Wang, C., & Chandrasena, M. I. U. (2022, October 16–18). Efficient attribute-based proxy re-encryption for secure deduplication. Security and Privacy in Social Networks and Big Data: 8th International Symposium, Xi’an, China.
  • Zheng, H., Shao, J., & Wei, G. (2020). Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Networking and Applications, 13(5), 1643–1655. https://doi.org/10.1007/s12083-020-00918-1
  • Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352–375. https://doi.org/10.1504/IJWGS.2018.095647
  • Zhou, Z., & Huang, D. (2012, October 22–26). Efficient and secure data storage operations for mobile cloud computing. 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm), Las Vegas, NV, USA.