Secure deduplication with reliable and revocable key management in fog computing

Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, Junbeom Hur

Research output: Contribution to journalArticle

Abstract

A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.

Original languageEnglish
JournalPeer-to-Peer Networking and Applications
DOIs
Publication statusAccepted/In press - 2018 Jan 1

Fingerprint

Fog
Cryptography
Costs

Keywords

  • Dynamic ownership
  • Fault tolerant key management
  • Fog computing security
  • Secure deduplication

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Cite this

Secure deduplication with reliable and revocable key management in fog computing. / Kwon, Hyunsoo; Hahn, Changhee; Kang, Kyungtae; Hur, Junbeom.

In: Peer-to-Peer Networking and Applications, 01.01.2018.

Research output: Contribution to journalArticle

@article{e0738f433d0245bf899251a18888f298,
title = "Secure deduplication with reliable and revocable key management in fog computing",
abstract = "A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.",
keywords = "Dynamic ownership, Fault tolerant key management, Fog computing security, Secure deduplication",
author = "Hyunsoo Kwon and Changhee Hahn and Kyungtae Kang and Junbeom Hur",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/s12083-018-0682-9",
language = "English",
journal = "Peer-to-Peer Networking and Applications",
issn = "1936-6442",
publisher = "Springer New York",

}

TY - JOUR

T1 - Secure deduplication with reliable and revocable key management in fog computing

AU - Kwon, Hyunsoo

AU - Hahn, Changhee

AU - Kang, Kyungtae

AU - Hur, Junbeom

PY - 2018/1/1

Y1 - 2018/1/1

N2 - A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.

AB - A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.

KW - Dynamic ownership

KW - Fault tolerant key management

KW - Fog computing security

KW - Secure deduplication

UR - http://www.scopus.com/inward/record.url?scp=85054835333&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85054835333&partnerID=8YFLogxK

U2 - 10.1007/s12083-018-0682-9

DO - 10.1007/s12083-018-0682-9

M3 - Article

JO - Peer-to-Peer Networking and Applications

JF - Peer-to-Peer Networking and Applications

SN - 1936-6442

ER -