4.5 Article

Secure deduplication with reliable and revocable key management in fog computing

期刊

PEER-TO-PEER NETWORKING AND APPLICATIONS
卷 12, 期 4, 页码 850-864

出版社

SPRINGER
DOI: 10.1007/s12083-018-0682-9

关键词

Fog computing security; Fault tolerant key management; Dynamic ownership; Secure deduplication

资金

  1. Institute for Information & communications Technology Promotion(IITP) - Korea government(MSIT) [2018-0-00269, 2017-0-00184, 2014-0-00065]
  2. National Research Foundation of Korea(NRF) - Korea government(MSIP) [2016R1A2A2A05005402]
  3. Institute for Information & Communication Technology Planning & Evaluation (IITP), Republic of Korea [2017-0-00184-003, 2014-3-00065-006] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)
  4. National Research Foundation of Korea [22A20131612273] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

向作者/读者索取更多资源

A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据