Secure and Efficient Hybrid Data Deduplication in Edge Computing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shin, Hyungjune | - |
dc.contributor.author | Koo, Dongyoung | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2022-09-24T03:40:19Z | - |
dc.date.available | 2022-09-24T03:40:19Z | - |
dc.date.created | 2022-09-23 | - |
dc.date.issued | 2022-08 | - |
dc.identifier.issn | 1533-5399 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/143824 | - |
dc.description.abstract | As an extension of cloud computing, edge computing introduces additional intermediate devices, called edge nodes near clients, providing computing services on behalf of the central cloud more efficiently. Although edge computing brings several benefits such as low latency and bandwidth savings on the edge side, rapid increase in the amount of data transmitted to the central cloud hinders efficient utilization of the storage system on the central cloud side especially when the data from edge devices are encrypted. To mitigate this issue in a privacy-preserving manner, data deduplication techniques for encrypted data have been extensively studied to enhance both the security and efficiency in the conventional cloud system with two different approaches. A server-side secure deduplication approach protects data privacy but impairs network efficiency by allowing duplicate uploads, while a client-side one improves network efficiency but suffers from potential information leakage due to its vulnerability to the side-channel attack. In this article, we propose a hybrid secure deduplication scheme for edge computing, which guarantees both advantages of the aforementioned two approaches. Specifically, our scheme guarantees data privacy by applying the server-side deduplication technique between the client and the edge nodes and maximizes network efficiency through the client-side deduplication technique between the edge nodes and the cloud. In addition, we devise a novel additively homomorphic encryption for efficient deduplication operations in the resource-limited edge nodes. Based on our experimental results, the proposed scheme reduces the communication costs by approximately 2.5 times for a storage server when the duplicate ratio is 50%, and the response time is reduced by about 2 times when the data size is 16 MB. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.subject | SCHEME | - |
dc.title | Secure and Efficient Hybrid Data Deduplication in Edge Computing | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hur, Junbeom | - |
dc.identifier.doi | 10.1145/3537675 | - |
dc.identifier.scopusid | 2-s2.0-85137765455 | - |
dc.identifier.wosid | 000844323400028 | - |
dc.identifier.bibliographicCitation | ACM TRANSACTIONS ON INTERNET TECHNOLOGY, v.22, no.3 | - |
dc.relation.isPartOf | ACM TRANSACTIONS ON INTERNET TECHNOLOGY | - |
dc.citation.title | ACM TRANSACTIONS ON INTERNET TECHNOLOGY | - |
dc.citation.volume | 22 | - |
dc.citation.number | 3 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordAuthor | Secure data deduplication | - |
dc.subject.keywordAuthor | cloud computing | - |
dc.subject.keywordAuthor | edge computing | - |
dc.subject.keywordAuthor | key sharing protocol | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.