Skip to main content
Log in

Secure deduplication with reliable and revocable key management in fog computing

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

A secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing

  2. Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: 2014 federated conference on computer science and information systems (FedCSIS)

  3. Kraemer FA, Braten AE, Tamkittikhun N, Palma D (2017) Fog computing in healthcare—a review and discussion. IEEE Access

  4. Clements AT, Ahmad I, Vilayannur M, Li J et al (2009) Decentralized Deduplication in SAN Cluster File Systems. In: USENIX annual technical conference

  5. Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a Serverless distributed file system. In: 22nd international conference on distributed computing systems, 2002. Proceedings

  6. Bolosky W J, Douceur J R, Ely D, Theimer M (2000) Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. ACM SIGMETRICS Performance Evaluation Review 28(1):34–43

  7. Dropbox. https://www.dropbox.com. Accessed 13 March 2018

  8. Google Drive. https://drive.google.com. Accessed March 13, 2018

  9. Mozy. https://www.mozy.com. Accessed March 13, 2018

  10. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques

  11. Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):3113–3125

  12. Li J, Li Y K, Chen X, Lee PPC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216

  13. Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579

  14. Stanek J, Sorniotti A, Androulaki E, Kencl L (2014) A secure data deduplication scheme for cloud storage. In: International conference on financial cryptography and data security

  15. Keelveedhi S, Bellare M, Ristenpart T (2013) DupLESS: server-aided encryption for deduplicated storage. Presented as part of the 22nd USENIX Security Symp

  16. Duan Y (2014) Distributed key generation for encrypted deduplication: achieving the strongest privacy. In: Proceedings of the 6th edition of the ACM workshop on cloud computing security

  17. Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2014), Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615– 1625

  18. Blakley GR, Meadows C (1984) Security of ramp schemes. In: Workshop on the theory and application of cryptographic technique

  19. Bellare M, Namprempre C, Pointcheval D, Semanko M (2003), The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. J Cryptol 16(3):185–215

  20. Li M, Qin C, Lee PPC, Li J (2014) Convergent dispersal: toward storage-efficient security in a Cloud-of-Clouds. HotCloud

  21. Li M, Qin C, Li J, Lee PPC (2016) Cdstore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. IEEE Internet Comput 20(3):45–53

  22. Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011). In: Proceedings of the 18th ACM conference on computer and communications security. Proofs of ownership in remote storage systems

  23. Laurie B, Langley A, Kasper E (2013) Certificate transparency. IETF

  24. Fahl S, Harbach M, Muders T, Smith M (2012) Confidentiality as a service–usable security for the cloud. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (TrustCom)

  25. Fahl S, Harbach M, Muders T, Smith M, Sander U (2012) Helping Johnny 2.0 to Encrypt His Facebook conversations. In: Proceedings of the eighth symposium on usable privacy and security

  26. OpenSSL Project. https://www.openssl.org. Accessed 13 March 2018

  27. The pairing-based cryptography library. https://crypto.stanford.edu/pbc/. Accessed 13 March 2018

  28. Plank JS, Simmerman S, Schuman CD (2008) Jerasure: a library in C/C+ + facilitating erasure coding for storage applications-version 1.2. Citeseer

  29. VMware. https://www.vmware.com. Accessed 13 March 2018

  30. Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. In: ACM computing surveys (CSUR)

  31. Kwon H, Hahn C, Koo D, Hur J (2017) Scalable and reliable key management for secure deduplication in cloud storage. In: 2017 IEEE 10th international conference on cloud computing (CLOUD)

  32. Jiang S, Jiang T, Wang L (2017) Secure and efficient cloud data deduplication with ownership management. IEEE Trans Serv Comput PP(99):1-1

  33. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP’07

  34. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security

  35. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques

  36. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques

  37. Russell A, Wang H (2002) How to fool an unbounded adversary with a short key. In: International conference on the theory and applications of cryptographic techniques

Download references

Acknowledgements

This work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2018-0-00269, A research on safe and convenient big data processing methods) (No.2017-0-00184, Self-Learning Cyber Immune Technology Development) (2014-0-00065, Resilient Cyber-Physical Systems Research). This work was also supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2016R1A2A2A05005402).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Kyungtae Kang or Junbeom Hur.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kwon, H., Hahn, C., Kang, K. et al. Secure deduplication with reliable and revocable key management in fog computing. Peer-to-Peer Netw. Appl. 12, 850–864 (2019). https://doi.org/10.1007/s12083-018-0682-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-018-0682-9

Keywords

Navigation