Computer Science ›› 2024, Vol. 51 ›› Issue (12): 352-360.doi: 10.11896/jsjkx.231100087

• Information Security • Previous Articles    

Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage

ZHOU Yiteng, TANG Xin, JIN Luchao   

  1. School of Cyber Science and Engineering, University of International Relations, Beijing 100091, China
  • Received:2023-11-15 Revised:2024-04-02 Online:2024-12-15 Published:2024-12-10
  • About author:ZHOU Yiteng,born in 1998,postgra-duate.Her main research interests include reversible data hiding and cloud data deduplication.
    TANG Xin,born in 1987,Ph.D,asso-ciate professor,is a member of CCF(No.H9744M).His main research interests include reversible watermar-king,cloud data deduplication,integrity auditing and scalable distributed data storage.
  • Supported by:
    Young Scientists Fund of the National Natural Science Foundation of China(62102113) and Fundamental Research Funds for the Central Universities,University of International Relations(3262023T33).

Abstract: With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images are directly stored in the cloud,which brings about the problem of confidentiality breach.Even though ciphertext deduplication is an effective means to deal with these problems,the differentiated response actually creates a side channel for attackers,which makes the existence privacy of data in cloud storage at risk.At the same time,in order to achieve key transferring between data owners,a huge amount of extra overhead is required.Thus,this paper proposes an efficient adaptive MSB reversible data hiding based secure deduplication(EMSD),which is able to effectively resist side channel attacks and save communication and storage overhead.Specifically,we innovatively introduce the reversible data hiding for encrypted images into ciphertext deduplication,and embed the auxiliary information for key transferring into the encrypted images before sending to the cloud.Thus the extra communication and storage overhead for auxiliary information are successfully eliminated.Furthermore,we optimize the existing deduplication scheme to ensure that even if the image in deduplication request is not duplicate,extra ciphertext uploading is not needed,thus indistinguishable response is achieved.Security analysis and experimental results show that,the proposed scheme is able to resist side channel attack in a lightweight way comparing with existing schemes.

Key words: Cloud storage, Deduplication for encrypted images, Side channel attack, Adaptive MSB prediction, Data hiding

CLC Number: 

  • TP309
[1]WANG C,ZHANG B,REN K,et al.Privacy-assured outsour-cing of image reconstruction service in cloud[J].IEEE Transactions on Emerging Topics in Computing,2013,1(1):166-177.
[2]TANG X,CHEN X,ZHOU R,et al.Marking based obfuscation strategy to resist side channel attack in cross-User deduplication for cloud storage[C]//Proceedings of the 21th IEEE International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom).Wuhan,China,2022:547-555.
[3]SHIN Y,KOO D,HUR J.A survey of secure data deduplication schemes for cloud storage systems[J].ACM Computing Surveys,2017,49(4):74.
[4]AGARWALA A,SINGH P,ATREY P.Client side secure imagededuplication using DICE protocol[C]//Proceedings of 2018 IEEE Conference on Multimedia Information Processing and Retrieval(MIPR).Miami,USA,2018:412-417.
[5]LI J,CHEN X,LI M,et al.Secure deduplication with efficient and reliable convergent key management[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(6):1615-1625.
[6]LI D,YANG C,JIANG Q,et al.A client-based image fuzzy deduplication method supporting proof of ownership[J].Chinese Journal of Computers,2018,41(6):1267-1283.
[7]TAKESHITA J,KARL R,JUNG T.Secure single-server nearly-identical image deduplication[C]//Proceedings of 2020 International Conference on Computer Communications and Networks(ICCCN).Honolulu,USA,2020:1-6.
[8]JIANG T,YUAN X,CHEN Y,et al.FuzzyDedup:secure fuzzy deduplication for cloud storage[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2466-2483.
[9]LIU X M,TANG X,JIN L C,et al.Secure cross-user fuzzy deduplication for images in cloud storage[C]//Proceedings of the 7th International Conference on Data Mining and Big Data(DMBD).Beijing,China,2022:291-302.
[10]HARNIK D,PINKAS B,SHULMAN-PELEG A.Side channels in cloud services:deduplication in cloud storage[J].IEEE Security & Privacy,2010,8(6):40-47.
[11]TANG X,ZHOU L N,SHAN W J,et al.Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack[J].Journal on Communications,2020,41(6):98-111.
[12]TANG X,ZHOU L N.Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack[J].Journal of Computer Applications,2020,40(4):1085-1090.
[13]YU C M,GOCHHAYAT S P,CONTI M,et al.Privacy aware data deduplication for side channel in cloud storage[J].IEEE Transactions on Cloud Computing,2020,8(2):597-609.
[14]BELLARE M,KEELVEEDHIS,RISTENPART T.Message-locked encryption and secure deduplication[C]//Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Athens,2013:296-312.
[15]STORER M W,GREENAN K,LONG D D,et al.Secure data deduplication[C]//Proceedings of the 2008 ACM Workshop on Storage Security and Survivability(StorageSS).Alexandria,2008:1-10.
[16]POORANIAN Z,SHOJAFAR M,GARG S,et al.LEVER:secure deduplicated cloud storage with encrypted two-party interactions in cyber-physical systems[J].IEEE Transactions on Industrial Informatics,2021,17(8):5759-5768.
[17]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J].IEEE Transactions on Multimedia,2022,24(1):1288-1298.
[18]LIU X M,TANG X,YANG S T,et al.Reed-Solomon coding based secure deduplication for cloud storage with resistance against side channel attack[J].Journal of Cyber Security,2022,7(6):80-93.
[19]TANG X,LIU Z,SHAO Y,et al.Side channel attack resistant cross-user generalized deduplication for cloud storage[C]//Proceedings of the 56th IEEE International Conference on Communications(ICC).Seoul,South Korea,2022:998-1003.
[20]TANG X,ZHOU Y T,CHENG Y X,et al.Weighted average-based complexity calculation in block selection oriented reversible data hiding[J].Security and Communication Networks,2022,2022:1-15.
[21]TANG X,ZHOU L N,TANG G,et al.Improved fluctuation derived block selection strategy in pixel value ordering based reversible data hiding[C]//Proceedings of the 20th International Workshop on Digital-forensics and Watermarking(IWDW).Beijing,China,2021:163-177.
[22]ZHANG X P.Reversible data hiding in encrypted image[J].IEEE Signal Processing Letters,2011,18(4):255-258.
[23]HONG W,CHEN T S,WU H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202.
[24]SIPI.The USC-SIPI image database[DB/OL].1977,http://sipi.usc.edu/database/.
[25]Unsplash.The UNSPLASH image database[DB/OL].2013,https://www.unsplash.com/.
[1] YUE Meng, ZHU Shibo, HONG Xueting, DUAN Bingyan. Airborne Software Audit Method Based on Trusted Implicit Third Party [J]. Computer Science, 2024, 51(6A): 230400088-6.
[2] AN Ruicheng, WANG Huaqun. Proxy Provable Data Possession with Key-exposure Resilient [J]. Computer Science, 2024, 51(12): 310-316.
[3] YUE Meng, WEN Cheng, HONG Xueting, YAN Simin. Airborne Software Provable Data Possession for Cloud Storage [J]. Computer Science, 2024, 51(11A): 240400040-10.
[4] WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370.
[5] LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui. Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [J]. Computer Science, 2023, 50(8): 294-303.
[6] WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307.
[7] HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346.
[8] SHEN Zhen, ZHAO Cheng-gui. Storage Task Allocation Algorithm in Decentralized Cloud Storage Network [J]. Computer Science, 2022, 49(12): 17-21.
[9] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[10] MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305.
[11] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[12] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[13] CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281.
[14] ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309.
[15] LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!