Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Koo, Dongyoung | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2021-09-02T17:14:05Z | - |
dc.date.available | 2021-09-02T17:14:05Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2018-01 | - |
dc.identifier.issn | 0167-739X | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/78533 | - |
dc.description.abstract | The explosion in the volume of data generated by end-point devices, arising from IoT proliferation, has lead to the adoption of data outsourcing to dedicated data centers. However, centralized data centers such as cloud storage cannot afford to manage large stores of data in a timely manner. To allow low latency access to large amounts of data, a new computing paradigm, called fog computing, has been introduced. In a fog computing environment, privacy issues surrounding outsourced data become more critical due to its complicated innards of the system. In addition, efficient resource management is another important criterion considering the application of pay-per-use in commercial fog storage. As an extension of cloud storage, most fog storage service providers will choose to adopt data deduplication techniques to minimize resource dissipation. At the same time, data owners may update or remove outsourced data stored in the remote storage to reduce expenses. In this paper, we propose the first privacy-preserving deduplication protocol capable of efficient ownership management in fog computing. It achieves fine-grained access control by introducing user-level key management and update mechanisms. Data-invariant user level private keys enable data owners to maintain a constant number of keys regardless of the number of outsourced data files. The update of user-level public keys for valid data owners at the remote storage dramatically reduces communication overhead. Security and performance analyses demonstrate the efficiency of the proposed scheme in terms of communication and key management in fog storage. (C) 2017 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | ADVERSARY MODEL | - |
dc.subject | EFFICIENT | - |
dc.subject | SECURITY | - |
dc.title | Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hur, Junbeom | - |
dc.identifier.doi | 10.1016/j.future.2017.01.024 | - |
dc.identifier.scopusid | 2-s2.0-85011277966 | - |
dc.identifier.wosid | 000413060400022 | - |
dc.identifier.bibliographicCitation | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.78, pp.739 - 752 | - |
dc.relation.isPartOf | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
dc.citation.title | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
dc.citation.volume | 78 | - |
dc.citation.startPage | 739 | - |
dc.citation.endPage | 752 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | ADVERSARY MODEL | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Data deduplication | - |
dc.subject.keywordAuthor | Fog computing | - |
dc.subject.keywordAuthor | Data privacy | - |
dc.subject.keywordAuthor | Data ownership management | - |
dc.subject.keywordAuthor | Efficiency | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.