4.5 Article

Secure deduplication schemes for content delivery in mobile edge computing

期刊

COMPUTERS & SECURITY
卷 114, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2022.102602

关键词

Data security; Edge computing; Secure deduplication; Data sharing; Content delivery

资金

  1. National Key R&D Program of China [2020YFB10 0590 0, NSFC-61902176, BK20190294, NSFC-61872179, NSFC-61872176]
  2. Leading-edge Technology Program of Jiangsu NSF [BK20202001]

向作者/读者索取更多资源

Data leakage poses a serious threat to edge computing users in the mobile edge computing (MEC) paradigm. This research considers the specific properties of MEC and proposes secure data deduplication schemes for centralized, semi-distributed, and distributed MEC settings. The schemes ensure secure data storage, retrieval, sharing, and deduplication.
Since the emergence of the mobile edge computing (MEC) paradigm, data leakage has become a serious threat against edge computing users, thwarting the further applications of MEC. Previous studies concentrating on data storage security and deduplication for conventional cloud computing paradigm cannot be simply adapted to edge computing because a central coordinator (for example, a cloud server) with a global view is not always available in MEC. To tackle this problem, we take the particular properties of MEC into consideration and propose secure data deduplication schemes for three MEC settings (i.e., centralized, semi-distributed and distributed settings). All of our schemes can provide secure data storage, retrieval, sharing, and deduplication. Through theoretical analysis, we prove the security of our schemes against typical attacks in outsourced data storage. Experimental results with a real-world deployment environment have showed that our schemes can guarantee service quality of MEC effectively. (C) 2022 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据