Journal of Northeastern University Natural Science ›› 2018, Vol. 39 ›› Issue (8): 1086-1091.DOI: 10.12068/j.issn.1005-3026.2018.08.005

• Information & Control • Previous Articles     Next Articles

An Efficient and Secure Cloud Storage Scheme with Hidden Access Patterns

LI Yu-xi, ZHOU Fu-cai, XU Zi-feng   

  1. School of Software, Northeastern University, Shenyang 110169, China.
  • Received:2017-04-12 Revised:2017-04-12 Online:2018-08-15 Published:2018-09-12
  • Contact: ZHOU Fu-cai
  • About author:-
  • Supported by:
    -

Abstract: Aiming at the problems of data confidentiality and user’s privacy leakage in cloud, this paper proposes an efficient and secure cloud storage scheme with hidden access patterns. Firstly, the files are divided into data blocks with fixed sizes, and encrypted by pseudo-random functions and collision-resistant Hash functions. Then, in order to construct the secure cloud storage structure, the blocks are uploaded into pseudo-random collection superset in the cloud server. Meanwhile, a two-round access strategy that hides the access patterns, reduces the storage cost and access interaction is designed. Security analysis shows that the proposed scheme achieves L1L2-dynamic adaptive security. Experimental results show that the proposed scheme can not only protect data confidentiality, but also be more suitable for the actual cloud storage.

Key words: cloud storage, access pattern, pseudo-random function, collision-resistant Hash function, confidentiality

CLC Number: