计算机科学 ›› 2024, Vol. 51 ›› Issue (12): 352-360.doi: 10.11896/jsjkx.231100087
• 信息安全 • 上一篇
周艺腾, 唐鑫, 金路超
ZHOU Yiteng, TANG Xin, JIN Luchao
摘要: 随着信息技术的飞速发展,越来越多以图像为代表的多媒体数据被重复上传到云平台进行存储,造成了用户通信开销和云端存储开销的极大浪费。此外,明文状态的图像数据存储在云端,导致数据机密性被破坏。尽管密文图像云数据去重技术在一定程度上解决了以上问题,但去重过程中产生的可区分响应为攻击者创建了一个侧信道,将泄露用户数据的存在性隐私。同时,为实现加密密钥在数据持有者间的传递,用户和云均需要付出巨大的额外代价。鉴于此,提出了一种基于自适应MSB可逆信息隐藏的高效密文图像安全去重机制,其能够在有效抵抗侧信道攻击的同时实现较低的通信开销和存储开销。具体来说,创新性地将密文域可逆信息隐藏技术引入密文去重框架,将用于传递随机密钥的辅助信息嵌入加密图像中并发送给云,从而消除辅助信息的传输和存储开销。此外,优化了现有的去重方案,即使请求图像并未存储于云端,用户也无需开展额外的密文上传工作,从而保证响应的不可区分性。安全性分析和实验结果表明,与现有方案相比,该方案能够以轻量级的方式抵抗侧信道攻击。
中图分类号:
[1]WANG C,ZHANG B,REN K,et al.Privacy-assured outsour-cing of image reconstruction service in cloud[J].IEEE Transactions on Emerging Topics in Computing,2013,1(1):166-177. [2]TANG X,CHEN X,ZHOU R,et al.Marking based obfuscation strategy to resist side channel attack in cross-User deduplication for cloud storage[C]//Proceedings of the 21th IEEE International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom).Wuhan,China,2022:547-555. [3]SHIN Y,KOO D,HUR J.A survey of secure data deduplication schemes for cloud storage systems[J].ACM Computing Surveys,2017,49(4):74. [4]AGARWALA A,SINGH P,ATREY P.Client side secure imagededuplication using DICE protocol[C]//Proceedings of 2018 IEEE Conference on Multimedia Information Processing and Retrieval(MIPR).Miami,USA,2018:412-417. [5]LI J,CHEN X,LI M,et al.Secure deduplication with efficient and reliable convergent key management[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(6):1615-1625. [6]LI D,YANG C,JIANG Q,et al.A client-based image fuzzy deduplication method supporting proof of ownership[J].Chinese Journal of Computers,2018,41(6):1267-1283. [7]TAKESHITA J,KARL R,JUNG T.Secure single-server nearly-identical image deduplication[C]//Proceedings of 2020 International Conference on Computer Communications and Networks(ICCCN).Honolulu,USA,2020:1-6. [8]JIANG T,YUAN X,CHEN Y,et al.FuzzyDedup:secure fuzzy deduplication for cloud storage[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2466-2483. [9]LIU X M,TANG X,JIN L C,et al.Secure cross-user fuzzy deduplication for images in cloud storage[C]//Proceedings of the 7th International Conference on Data Mining and Big Data(DMBD).Beijing,China,2022:291-302. [10]HARNIK D,PINKAS B,SHULMAN-PELEG A.Side channels in cloud services:deduplication in cloud storage[J].IEEE Security & Privacy,2010,8(6):40-47. [11]TANG X,ZHOU L N,SHAN W J,et al.Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack[J].Journal on Communications,2020,41(6):98-111. [12]TANG X,ZHOU L N.Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack[J].Journal of Computer Applications,2020,40(4):1085-1090. [13]YU C M,GOCHHAYAT S P,CONTI M,et al.Privacy aware data deduplication for side channel in cloud storage[J].IEEE Transactions on Cloud Computing,2020,8(2):597-609. [14]BELLARE M,KEELVEEDHIS,RISTENPART T.Message-locked encryption and secure deduplication[C]//Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Athens,2013:296-312. [15]STORER M W,GREENAN K,LONG D D,et al.Secure data deduplication[C]//Proceedings of the 2008 ACM Workshop on Storage Security and Survivability(StorageSS).Alexandria,2008:1-10. [16]POORANIAN Z,SHOJAFAR M,GARG S,et al.LEVER:secure deduplicated cloud storage with encrypted two-party interactions in cyber-physical systems[J].IEEE Transactions on Industrial Informatics,2021,17(8):5759-5768. [17]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J].IEEE Transactions on Multimedia,2022,24(1):1288-1298. [18]LIU X M,TANG X,YANG S T,et al.Reed-Solomon coding based secure deduplication for cloud storage with resistance against side channel attack[J].Journal of Cyber Security,2022,7(6):80-93. [19]TANG X,LIU Z,SHAO Y,et al.Side channel attack resistant cross-user generalized deduplication for cloud storage[C]//Proceedings of the 56th IEEE International Conference on Communications(ICC).Seoul,South Korea,2022:998-1003. [20]TANG X,ZHOU Y T,CHENG Y X,et al.Weighted average-based complexity calculation in block selection oriented reversible data hiding[J].Security and Communication Networks,2022,2022:1-15. [21]TANG X,ZHOU L N,TANG G,et al.Improved fluctuation derived block selection strategy in pixel value ordering based reversible data hiding[C]//Proceedings of the 20th International Workshop on Digital-forensics and Watermarking(IWDW).Beijing,China,2021:163-177. [22]ZHANG X P.Reversible data hiding in encrypted image[J].IEEE Signal Processing Letters,2011,18(4):255-258. [23]HONG W,CHEN T S,WU H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202. [24]SIPI.The USC-SIPI image database[DB/OL].1977,http://sipi.usc.edu/database/. [25]Unsplash.The UNSPLASH image database[DB/OL].2013,https://www.unsplash.com/. |
|