Secure deduplication with reliable and revocable key management in fog computing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Hyunsoo | - |
dc.contributor.author | Hahn, Changhee | - |
dc.contributor.author | Kang, Kyungtae | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2021-06-22T10:01:08Z | - |
dc.date.available | 2021-06-22T10:01:08Z | - |
dc.date.issued | 2019-07 | - |
dc.identifier.issn | 1936-6442 | - |
dc.identifier.issn | 1936-6450 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/2779 | - |
dc.description.abstract | A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management. | - |
dc.format.extent | 15 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | SPRINGER | - |
dc.title | Secure deduplication with reliable and revocable key management in fog computing | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1007/s12083-018-0682-9 | - |
dc.identifier.scopusid | 2-s2.0-85054835333 | - |
dc.identifier.wosid | 000472581600011 | - |
dc.identifier.bibliographicCitation | PEER-TO-PEER NETWORKING AND APPLICATIONS, v.12, no.4, pp 850 - 864 | - |
dc.citation.title | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.volume | 12 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 850 | - |
dc.citation.endPage | 864 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | Digital storage | - |
dc.subject.keywordPlus | Fog | - |
dc.subject.keywordPlus | Fog computing | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Problem solving | - |
dc.subject.keywordPlus | Public key cryptography | - |
dc.subject.keywordPlus | Additional costs | - |
dc.subject.keywordPlus | Computing security | - |
dc.subject.keywordPlus | De duplications | - |
dc.subject.keywordPlus | Encryption key management | - |
dc.subject.keywordPlus | Key management | - |
dc.subject.keywordPlus | Ownership changes | - |
dc.subject.keywordPlus | Ownership managements | - |
dc.subject.keywordPlus | Pairing-based cryptography | - |
dc.subject.keywordAuthor | Fog computing security | - |
dc.subject.keywordAuthor | Fault tolerant key management | - |
dc.subject.keywordAuthor | Dynamic ownership | - |
dc.subject.keywordAuthor | Secure deduplication | - |
dc.identifier.url | https://link.springer.com/article/10.1007/s12083-018-0682-9 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.