Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

Dongyoung Koo, Junbeom Hur

Research output: Contribution to journalArticle

20 Citations (Scopus)

Abstract

The explosion in the volume of data generated by end-point devices, arising from IoT proliferation, has lead to the adoption of data outsourcing to dedicated data centers. However, centralized data centers such as cloud storage cannot afford to manage large stores of data in a timely manner. To allow low latency access to large amounts of data, a new computing paradigm, called fog computing, has been introduced. In a fog computing environment, privacy issues surrounding outsourced data become more critical due to its complicated innards of the system. In addition, efficient resource management is another important criterion considering the application of pay-per-use in commercial fog storage. As an extension of cloud storage, most fog storage service providers will choose to adopt data deduplication techniques to minimize resource dissipation. At the same time, data owners may update or remove outsourced data stored in the remote storage to reduce expenses. In this paper, we propose the first privacy-preserving deduplication protocol capable of efficient ownership management in fog computing. It achieves fine-grained access control by introducing user-level key management and update mechanisms. Data-invariant user-level private keys enable data owners to maintain a constant number of keys regardless of the number of outsourced data files. The update of user-level public keys for valid data owners at the remote storage dramatically reduces communication overhead. Security and performance analyses demonstrate the efficiency of the proposed scheme in terms of communication and key management in fog storage.

Original languageEnglish
Pages (from-to)739-752
Number of pages14
JournalFuture Generation Computer Systems
Volume78
DOIs
Publication statusPublished - 2018 Jan 1

Fingerprint

Fog
Communication
Outsourcing
Access control
Explosions
Network protocols

Keywords

  • Data deduplication
  • Data ownership management
  • Data privacy
  • Efficiency
  • Fog computing

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. / Koo, Dongyoung; Hur, Junbeom.

In: Future Generation Computer Systems, Vol. 78, 01.01.2018, p. 739-752.

Research output: Contribution to journalArticle

@article{c3e5fbd682d04fce898ff90b493ffe82,
title = "Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing",
abstract = "The explosion in the volume of data generated by end-point devices, arising from IoT proliferation, has lead to the adoption of data outsourcing to dedicated data centers. However, centralized data centers such as cloud storage cannot afford to manage large stores of data in a timely manner. To allow low latency access to large amounts of data, a new computing paradigm, called fog computing, has been introduced. In a fog computing environment, privacy issues surrounding outsourced data become more critical due to its complicated innards of the system. In addition, efficient resource management is another important criterion considering the application of pay-per-use in commercial fog storage. As an extension of cloud storage, most fog storage service providers will choose to adopt data deduplication techniques to minimize resource dissipation. At the same time, data owners may update or remove outsourced data stored in the remote storage to reduce expenses. In this paper, we propose the first privacy-preserving deduplication protocol capable of efficient ownership management in fog computing. It achieves fine-grained access control by introducing user-level key management and update mechanisms. Data-invariant user-level private keys enable data owners to maintain a constant number of keys regardless of the number of outsourced data files. The update of user-level public keys for valid data owners at the remote storage dramatically reduces communication overhead. Security and performance analyses demonstrate the efficiency of the proposed scheme in terms of communication and key management in fog storage.",
keywords = "Data deduplication, Data ownership management, Data privacy, Efficiency, Fog computing",
author = "Dongyoung Koo and Junbeom Hur",
year = "2018",
month = "1",
day = "1",
doi = "10.1016/j.future.2017.01.024",
language = "English",
volume = "78",
pages = "739--752",
journal = "Future Generation Computer Systems",
issn = "0167-739X",
publisher = "Elsevier",

}

TY - JOUR

T1 - Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

AU - Koo, Dongyoung

AU - Hur, Junbeom

PY - 2018/1/1

Y1 - 2018/1/1

N2 - The explosion in the volume of data generated by end-point devices, arising from IoT proliferation, has lead to the adoption of data outsourcing to dedicated data centers. However, centralized data centers such as cloud storage cannot afford to manage large stores of data in a timely manner. To allow low latency access to large amounts of data, a new computing paradigm, called fog computing, has been introduced. In a fog computing environment, privacy issues surrounding outsourced data become more critical due to its complicated innards of the system. In addition, efficient resource management is another important criterion considering the application of pay-per-use in commercial fog storage. As an extension of cloud storage, most fog storage service providers will choose to adopt data deduplication techniques to minimize resource dissipation. At the same time, data owners may update or remove outsourced data stored in the remote storage to reduce expenses. In this paper, we propose the first privacy-preserving deduplication protocol capable of efficient ownership management in fog computing. It achieves fine-grained access control by introducing user-level key management and update mechanisms. Data-invariant user-level private keys enable data owners to maintain a constant number of keys regardless of the number of outsourced data files. The update of user-level public keys for valid data owners at the remote storage dramatically reduces communication overhead. Security and performance analyses demonstrate the efficiency of the proposed scheme in terms of communication and key management in fog storage.

AB - The explosion in the volume of data generated by end-point devices, arising from IoT proliferation, has lead to the adoption of data outsourcing to dedicated data centers. However, centralized data centers such as cloud storage cannot afford to manage large stores of data in a timely manner. To allow low latency access to large amounts of data, a new computing paradigm, called fog computing, has been introduced. In a fog computing environment, privacy issues surrounding outsourced data become more critical due to its complicated innards of the system. In addition, efficient resource management is another important criterion considering the application of pay-per-use in commercial fog storage. As an extension of cloud storage, most fog storage service providers will choose to adopt data deduplication techniques to minimize resource dissipation. At the same time, data owners may update or remove outsourced data stored in the remote storage to reduce expenses. In this paper, we propose the first privacy-preserving deduplication protocol capable of efficient ownership management in fog computing. It achieves fine-grained access control by introducing user-level key management and update mechanisms. Data-invariant user-level private keys enable data owners to maintain a constant number of keys regardless of the number of outsourced data files. The update of user-level public keys for valid data owners at the remote storage dramatically reduces communication overhead. Security and performance analyses demonstrate the efficiency of the proposed scheme in terms of communication and key management in fog storage.

KW - Data deduplication

KW - Data ownership management

KW - Data privacy

KW - Efficiency

KW - Fog computing

UR - http://www.scopus.com/inward/record.url?scp=85011277966&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85011277966&partnerID=8YFLogxK

U2 - 10.1016/j.future.2017.01.024

DO - 10.1016/j.future.2017.01.024

M3 - Article

AN - SCOPUS:85011277966

VL - 78

SP - 739

EP - 752

JO - Future Generation Computer Systems

JF - Future Generation Computer Systems

SN - 0167-739X

ER -