计算机科学 ›› 2024, Vol. 51 ›› Issue (12): 352-360.doi: 10.11896/jsjkx.231100087

• 信息安全 • 上一篇    

基于自适应MSB可逆信息隐藏的图像云数据密文安全去重机制

周艺腾, 唐鑫, 金路超   

  1. 国际关系学院网络空间安全学院 北京 100091
  • 收稿日期:2023-11-15 修回日期:2024-04-02 出版日期:2024-12-15 发布日期:2024-12-10
  • 通讯作者: 唐鑫(xtang@uir.edu.cn)
  • 作者简介:(ytzhou@uir.edu.cn)
  • 基金资助:
    国家自然科学基金青年科学基金(62102113);国际关系学院中央高校基本科研业务费项目(3262023T33)

Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage

ZHOU Yiteng, TANG Xin, JIN Luchao   

  1. School of Cyber Science and Engineering, University of International Relations, Beijing 100091, China
  • Received:2023-11-15 Revised:2024-04-02 Online:2024-12-15 Published:2024-12-10
  • About author:ZHOU Yiteng,born in 1998,postgra-duate.Her main research interests include reversible data hiding and cloud data deduplication.
    TANG Xin,born in 1987,Ph.D,asso-ciate professor,is a member of CCF(No.H9744M).His main research interests include reversible watermar-king,cloud data deduplication,integrity auditing and scalable distributed data storage.
  • Supported by:
    Young Scientists Fund of the National Natural Science Foundation of China(62102113) and Fundamental Research Funds for the Central Universities,University of International Relations(3262023T33).

摘要: 随着信息技术的飞速发展,越来越多以图像为代表的多媒体数据被重复上传到云平台进行存储,造成了用户通信开销和云端存储开销的极大浪费。此外,明文状态的图像数据存储在云端,导致数据机密性被破坏。尽管密文图像云数据去重技术在一定程度上解决了以上问题,但去重过程中产生的可区分响应为攻击者创建了一个侧信道,将泄露用户数据的存在性隐私。同时,为实现加密密钥在数据持有者间的传递,用户和云均需要付出巨大的额外代价。鉴于此,提出了一种基于自适应MSB可逆信息隐藏的高效密文图像安全去重机制,其能够在有效抵抗侧信道攻击的同时实现较低的通信开销和存储开销。具体来说,创新性地将密文域可逆信息隐藏技术引入密文去重框架,将用于传递随机密钥的辅助信息嵌入加密图像中并发送给云,从而消除辅助信息的传输和存储开销。此外,优化了现有的去重方案,即使请求图像并未存储于云端,用户也无需开展额外的密文上传工作,从而保证响应的不可区分性。安全性分析和实验结果表明,与现有方案相比,该方案能够以轻量级的方式抵抗侧信道攻击。

关键词: 云存储, 加密图像去重, 侧信道攻击, 自适应MSB预测, 信息隐藏

Abstract: With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images are directly stored in the cloud,which brings about the problem of confidentiality breach.Even though ciphertext deduplication is an effective means to deal with these problems,the differentiated response actually creates a side channel for attackers,which makes the existence privacy of data in cloud storage at risk.At the same time,in order to achieve key transferring between data owners,a huge amount of extra overhead is required.Thus,this paper proposes an efficient adaptive MSB reversible data hiding based secure deduplication(EMSD),which is able to effectively resist side channel attacks and save communication and storage overhead.Specifically,we innovatively introduce the reversible data hiding for encrypted images into ciphertext deduplication,and embed the auxiliary information for key transferring into the encrypted images before sending to the cloud.Thus the extra communication and storage overhead for auxiliary information are successfully eliminated.Furthermore,we optimize the existing deduplication scheme to ensure that even if the image in deduplication request is not duplicate,extra ciphertext uploading is not needed,thus indistinguishable response is achieved.Security analysis and experimental results show that,the proposed scheme is able to resist side channel attack in a lightweight way comparing with existing schemes.

Key words: Cloud storage, Deduplication for encrypted images, Side channel attack, Adaptive MSB prediction, Data hiding

中图分类号: 

  • TP309
[1]WANG C,ZHANG B,REN K,et al.Privacy-assured outsour-cing of image reconstruction service in cloud[J].IEEE Transactions on Emerging Topics in Computing,2013,1(1):166-177.
[2]TANG X,CHEN X,ZHOU R,et al.Marking based obfuscation strategy to resist side channel attack in cross-User deduplication for cloud storage[C]//Proceedings of the 21th IEEE International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom).Wuhan,China,2022:547-555.
[3]SHIN Y,KOO D,HUR J.A survey of secure data deduplication schemes for cloud storage systems[J].ACM Computing Surveys,2017,49(4):74.
[4]AGARWALA A,SINGH P,ATREY P.Client side secure imagededuplication using DICE protocol[C]//Proceedings of 2018 IEEE Conference on Multimedia Information Processing and Retrieval(MIPR).Miami,USA,2018:412-417.
[5]LI J,CHEN X,LI M,et al.Secure deduplication with efficient and reliable convergent key management[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(6):1615-1625.
[6]LI D,YANG C,JIANG Q,et al.A client-based image fuzzy deduplication method supporting proof of ownership[J].Chinese Journal of Computers,2018,41(6):1267-1283.
[7]TAKESHITA J,KARL R,JUNG T.Secure single-server nearly-identical image deduplication[C]//Proceedings of 2020 International Conference on Computer Communications and Networks(ICCCN).Honolulu,USA,2020:1-6.
[8]JIANG T,YUAN X,CHEN Y,et al.FuzzyDedup:secure fuzzy deduplication for cloud storage[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2466-2483.
[9]LIU X M,TANG X,JIN L C,et al.Secure cross-user fuzzy deduplication for images in cloud storage[C]//Proceedings of the 7th International Conference on Data Mining and Big Data(DMBD).Beijing,China,2022:291-302.
[10]HARNIK D,PINKAS B,SHULMAN-PELEG A.Side channels in cloud services:deduplication in cloud storage[J].IEEE Security & Privacy,2010,8(6):40-47.
[11]TANG X,ZHOU L N,SHAN W J,et al.Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack[J].Journal on Communications,2020,41(6):98-111.
[12]TANG X,ZHOU L N.Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack[J].Journal of Computer Applications,2020,40(4):1085-1090.
[13]YU C M,GOCHHAYAT S P,CONTI M,et al.Privacy aware data deduplication for side channel in cloud storage[J].IEEE Transactions on Cloud Computing,2020,8(2):597-609.
[14]BELLARE M,KEELVEEDHIS,RISTENPART T.Message-locked encryption and secure deduplication[C]//Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Athens,2013:296-312.
[15]STORER M W,GREENAN K,LONG D D,et al.Secure data deduplication[C]//Proceedings of the 2008 ACM Workshop on Storage Security and Survivability(StorageSS).Alexandria,2008:1-10.
[16]POORANIAN Z,SHOJAFAR M,GARG S,et al.LEVER:secure deduplicated cloud storage with encrypted two-party interactions in cyber-physical systems[J].IEEE Transactions on Industrial Informatics,2021,17(8):5759-5768.
[17]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J].IEEE Transactions on Multimedia,2022,24(1):1288-1298.
[18]LIU X M,TANG X,YANG S T,et al.Reed-Solomon coding based secure deduplication for cloud storage with resistance against side channel attack[J].Journal of Cyber Security,2022,7(6):80-93.
[19]TANG X,LIU Z,SHAO Y,et al.Side channel attack resistant cross-user generalized deduplication for cloud storage[C]//Proceedings of the 56th IEEE International Conference on Communications(ICC).Seoul,South Korea,2022:998-1003.
[20]TANG X,ZHOU Y T,CHENG Y X,et al.Weighted average-based complexity calculation in block selection oriented reversible data hiding[J].Security and Communication Networks,2022,2022:1-15.
[21]TANG X,ZHOU L N,TANG G,et al.Improved fluctuation derived block selection strategy in pixel value ordering based reversible data hiding[C]//Proceedings of the 20th International Workshop on Digital-forensics and Watermarking(IWDW).Beijing,China,2021:163-177.
[22]ZHANG X P.Reversible data hiding in encrypted image[J].IEEE Signal Processing Letters,2011,18(4):255-258.
[23]HONG W,CHEN T S,WU H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202.
[24]SIPI.The USC-SIPI image database[DB/OL].1977,http://sipi.usc.edu/database/.
[25]Unsplash.The UNSPLASH image database[DB/OL].2013,https://www.unsplash.com/.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!