메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 739-752

Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

Author keywords

Data deduplication; Data ownership management; Data privacy; Efficiency; Fog computing

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; DIGITAL STORAGE; EFFICIENCY; FOG; STORAGE MANAGEMENT;

EID: 85011277966     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.01.024     Document Type: Article
Times cited : (76)

References (75)
  • 1
    • 85029653885 scopus 로고    scopus 로고
    • Gartner says 6.4 billion connected “things” will be in use in 2016, up 30 percent from Available at (11/10/2015).
    • R. van der Meulen, Gartner says 6.4 billion connected “things” will be in use in 2016, up 30 percent from 2015, Available at http://www.gartner.com/newsroom/id/3165317  (11/10/2015).
    • (2015)
    • van der Meulen, R.1
  • 2
    • 85029657156 scopus 로고    scopus 로고
    • Idc market in a minute: Internet of things, Available at
    • Idc market in a minute: Internet of things, Available at http://www.idc.com/downloads/idc_market_in_a_minute_iot_infographic.pdf.
  • 3
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • S. Yi, C. Li, Q. Li, A survey of fog computing: Concepts, applications and issues, in: Workshop on Mobile Big Data (Mobidata), 2015, pp. 37–42.
    • (2015) Workshop on Mobile Big Data (Mobidata) , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.3
  • 6
    • 84925450955 scopus 로고    scopus 로고
    • Fog Computing: A Platform for Internet of Things and Analytics
    • Springer International Publishing
    • Bonomi, F., Milito, R., Natarajan, P., Zhu, J., Fog Computing: A Platform for Internet of Things and Analytics. 2014, Springer International Publishing, 169–186.
    • (2014) , pp. 169-186
    • Bonomi, F.1    Milito, R.2    Natarajan, P.3    Zhu, J.4
  • 8
    • 85029651016 scopus 로고    scopus 로고
    • An overview of the security concerns in enterprise cloud computing, CoRR abs/1101.5613, URL.
    • A. Bisong, S.M. Rahman, An overview of the security concerns in enterprise cloud computing, CoRR abs/1101.5613, 2011, pp. 1–161. URL http://arxiv.org/abs/1101.5613.
    • (2011) , pp. 1-161
    • Bisong, A.1    Rahman, S.M.2
  • 10
    • 84963728330 scopus 로고    scopus 로고
    • Forensic-by-design framework for cyber-physical cloud systems
    • Rahman, N.H.A., Glisson, W.B., Yang, Y., Choo, K.-K.R., Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
    • (2016) IEEE Cloud Comput. , vol.3 , Issue.1 , pp. 50-59
    • Rahman, N.H.A.1    Glisson, W.B.2    Yang, Y.3    Choo, K.-K.R.4
  • 11
    • 84958035718 scopus 로고    scopus 로고
    • On Lightweight Security Enforcement in Cyber-Physical Systems
    • Springer International Publishing
    • Yang, Y., Lu, J., Choo, K.-K.R., Liu, J.K., On Lightweight Security Enforcement in Cyber-Physical Systems. 2016, Springer International Publishing, 97–112.
    • (2016) , pp. 97-112
    • Yang, Y.1    Lu, J.2    Choo, K.-K.R.3    Liu, J.K.4
  • 12
    • 85018167456 scopus 로고    scopus 로고
    • Forensic investigation of {P2P} cloud storage services and backbone for iot networks: Bittorrent sync as a case study
    • Teing, Y.-Y., Dehghantanha, A., Choo, K.-K.R., Yang, L.T., Forensic investigation of {P2P} cloud storage services and backbone for iot networks: Bittorrent sync as a case study. Comput. Electr. Eng., 2016, 1–14.
    • (2016) Comput. Electr. Eng. , pp. 1-14
    • Teing, Y.-Y.1    Dehghantanha, A.2    Choo, K.-K.R.3    Yang, L.T.4
  • 13
    • 85029665042 scopus 로고    scopus 로고
    • Mailcious insider attacks to rise, Available at
    • Mailcious insider attacks to rise, Available at http://news.bbc.co.uk/2/hi/7875904.stm.
  • 14
    • 85029619702 scopus 로고    scopus 로고
    • Ex-employees say it's ok to take corporate data with them, Available at
    • Ex-employees say it's ok to take corporate data with them, Available at http://www.darkreading.com/insider-threat/167801100/security/vulnerabilities/240148112/ex-employees-say-it-s-ok-to-take-corporate-data-with-them.
  • 15
    • 84924712095 scopus 로고    scopus 로고
    • Efficient self-healing group key management with dynamic revocation and collusion resistance for scada in smart grid
    • Jiang, R., Lu, R., Luo, J., Lai, C., Shen, X.S., Efficient self-healing group key management with dynamic revocation and collusion resistance for scada in smart grid. Secur. Commun. Netw. 8:6 (2015), 1026–1039.
    • (2015) Secur. Commun. Netw. , vol.8 , Issue.6 , pp. 1026-1039
    • Jiang, R.1    Lu, R.2    Luo, J.3    Lai, C.4    Shen, X.S.5
  • 17
    • 84990043590 scopus 로고    scopus 로고
    • Data exfiltration from Internet of things devices: ios devices as case studies
    • D'Orazio, C.J., Choo, K.-K.R., Yang, L.T., Data exfiltration from Internet of things devices: ios devices as case studies. IEEE Internet Things J. PP:99 (2016), 1–12.
    • (2016) IEEE Internet Things J. , vol.PP , Issue.99 , pp. 1-12
    • D'Orazio, C.J.1    Choo, K.-K.R.2    Yang, L.T.3
  • 18
    • 85019802521 scopus 로고    scopus 로고
    • A technique to circumvent ssl/tls validations on ios devices
    • D'Orazio, C.J., Choo, K.-K.R., A technique to circumvent ssl/tls validations on ios devices. Future Gener. Comput. Syst., 2016, 1–9.
    • (2016) Future Gener. Comput. Syst. , pp. 1-9
    • D'Orazio, C.J.1    Choo, K.-K.R.2
  • 19
    • 78650259456 scopus 로고    scopus 로고
    • Secure Key Establishment, Vol. 41
    • Springer US
    • Choo, K.-K.R., Secure Key Establishment, Vol. 41. 2009, Springer, US.
    • (2009)
    • Choo, K.-K.R.1
  • 21
    • 84951824554 scopus 로고    scopus 로고
    • Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data
    • Springer International Publishing
    • Yang, Y., Liu, J.K., Liang, K., Choo, K.-K.R., Zhou, J., Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. 2015, Springer International Publishing, 146–166.
    • (2015) , pp. 146-166
    • Yang, Y.1    Liu, J.K.2    Liang, K.3    Choo, K.-K.R.4    Zhou, J.5
  • 30
    • 84929956069 scopus 로고    scopus 로고
    • Esc: An efficient, scalable, and crypto-less solution to secure wireless networks
    • Di Pietro, R., Oligeri, G., Esc: An efficient, scalable, and crypto-less solution to secure wireless networks. Comput. Netw. 84 (2015), 46–63.
    • (2015) Comput. Netw. , vol.84 , pp. 46-63
    • Di Pietro, R.1    Oligeri, G.2
  • 33
    • 84883391608 scopus 로고    scopus 로고
    • Message-Locked Encryption and Secure Deduplication
    • Springer Berlin, Heidelberg
    • Bellare, M., Keelveedhi, S., Ristenpart, T., Message-Locked Encryption and Secure Deduplication. 2013, Springer, Berlin, Heidelberg, 296–312.
    • (2013) , pp. 296-312
    • Bellare, M.1    Keelveedhi, S.2    Ristenpart, T.3
  • 37
    • 84961369151 scopus 로고
    • Security of Ramp Schemes
    • Springer Berlin, Heidelberg
    • Blakley, G.R., Meadows, C., Security of Ramp Schemes. 1985, Springer, Berlin, Heidelberg, 242–268.
    • (1985) , pp. 242-268
    • Blakley, G.R.1    Meadows, C.2
  • 38
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36:2 (1989), 335–348.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 40
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: Deduplication in cloud storage
    • Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: Deduplication in cloud storage. IEEE Secur. Privacy 8:6 (2010), 40–47.
    • (2010) IEEE Secur. Privacy , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 41
    • 84872371278 scopus 로고    scopus 로고
    • Privacy-preserving cross-user source-based data deduplication in cloud storage
    • S. Lee, D. Choi, Privacy-preserving cross-user source-based data deduplication in cloud storage, in: International Conference on ICT Convergence (ICTC), 2012, pp. 329–330.
    • (2012) International Conference on ICT Convergence (ICTC) , pp. 329-330
    • Lee, S.1    Choi, D.2
  • 43
    • 84893588264 scopus 로고    scopus 로고
    • Security weakness in the proof of storage with deduplication.
    • Y. Shin, J. Hur, K. Kim, Security weakness in the proof of storage with deduplication., in: IACR Cryptology ePrint Archive 2012 (2012) 1–11.
    • (2012) in: IACR Cryptology ePrint Archive , vol.2012 , pp. 1-11
    • Shin, Y.1    Hur, J.2    Kim, K.3
  • 44
    • 84928914432 scopus 로고    scopus 로고
    • Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation
    • Nam, J., Choo, K.-K.R., Han, S., Kim, M., Paik, J., Won, D., Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation. PLoS One 10:4 (2015), 1–21.
    • (2015) PLoS One , vol.10 , Issue.4 , pp. 1-21
    • Nam, J.1    Choo, K.-K.R.2    Han, S.3    Kim, M.4    Paik, J.5    Won, D.6
  • 45
    • 84978264488 scopus 로고    scopus 로고
    • Towards Lightweight Anonymous Entity Authentication for IoT Applications
    • Springer International Publishing
    • Yang, Y., Cai, H., Wei, Z., Lu, H., Choo, K.-K.R., Towards Lightweight Anonymous Entity Authentication for IoT Applications. 2016, Springer International Publishing, 265–280.
    • (2016) , pp. 265-280
    • Yang, Y.1    Cai, H.2    Wei, Z.3    Lu, H.4    Choo, K.-K.R.5
  • 46
    • 84857486926 scopus 로고    scopus 로고
    • Hash challenges: Stretching the limits of compare-by-hash in distributed data deduplication
    • Barreto, J., Veiga, L., Ferreira, P., Hash challenges: Stretching the limits of compare-by-hash in distributed data deduplication. Inform. Process. Lett. 112:10 (2012), 380–385.
    • (2012) Inform. Process. Lett. , vol.112 , Issue.10 , pp. 380-385
    • Barreto, J.1    Veiga, L.2    Ferreira, P.3
  • 47
    • 84922430173 scopus 로고    scopus 로고
    • An efficient confidentiality-preserving proof of ownership for deduplication
    • González-Manzano, L., Orfila, A., An efficient confidentiality-preserving proof of ownership for deduplication. J. Netw. Comput. Appl. 50 (2015), 49–59.
    • (2015) J. Netw. Comput. Appl. , vol.50 , pp. 49-59
    • González-Manzano, L.1    Orfila, A.2
  • 52
    • 84901032811 scopus 로고    scopus 로고
    • Secure deduplication with efficient and reliable convergent key management
    • Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W., Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25:6 (2014), 1615–1625.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.2    Li, M.3    Li, J.4    Lee, P.P.C.5    Lou, W.6
  • 54
    • 85029642226 scopus 로고    scopus 로고
    • Telefonica, the response of the csps to the iot burst, Available at
    • Telefonica, the response of the csps to the iot burst, Available at https://iot.telefonica.com/multimedia-resources/the-response-of-the-csps-to-the-iot-burst-whitepaper.
  • 55
    • 13444291124 scopus 로고    scopus 로고
    • Efficient near-duplicate detection and sub-image retrieval
    • Y. Ke, R. Sukthankar, L. Huston, Y. Ke, R. Sukthankar, Efficient near-duplicate detection and sub-image retrieval, in: ACM Multimedia, Vol. 4, 2004, pp. 1–10.
    • (2004) ACM Multimedia , vol.4 , pp. 1-10
    • Ke, Y.1    Sukthankar, R.2    Huston, L.3    Ke, Y.4    Sukthankar, R.5
  • 57
  • 58
    • 80053020495 scopus 로고    scopus 로고
    • I Have a DREAM! (DiffeRentially privatE smArt Metering)
    • G. Ács, C. Castelluccia, I Have a DREAM! (DiffeRentially privatE smArt Metering), 2011, pp. 118–132.
    • (2011) , pp. 118-132
    • Ács, G.1    Castelluccia, C.2
  • 60
    • 84971637093 scopus 로고    scopus 로고
    • Privacy-preserving-outsourced association rule mining on vertically partitioned databases
    • Li, L., Lu, R., Choo, K.-K.R., Datta, A., Shao, S., Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11:8 (2016), 1847–1861.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.8 , pp. 1847-1861
    • Li, L.1    Lu, R.2    Choo, K.-K.R.3    Datta, A.4    Shao, S.5
  • 61
    • 84959860456 scopus 로고    scopus 로고
    • Secure multi-server-aided data deduplication in cloud computing
    • Special Issue on Secure Ubiquitous Computing
    • Miao, M., Wang, J., Li, H., Chen, X., Secure multi-server-aided data deduplication in cloud computing. Pervasive Mob. Comput. 24 (2015), 129–137 Special Issue on Secure Ubiquitous Computing.
    • (2015) Pervasive Mob. Comput. , vol.24 , pp. 129-137
    • Miao, M.1    Wang, J.2    Li, H.3    Chen, X.4
  • 62
    • 84937705612 scopus 로고    scopus 로고
    • Distributed key generation for encrypted deduplication: Achieving the strongest privacy
    • Y. Duan, Distributed key generation for encrypted deduplication: Achieving the strongest privacy, in: ACM Workshop on Cloud Computing Security (CCSW), 2014, pp. 57–68.
    • (2014) ACM Workshop on Cloud Computing Security (CCSW) , pp. 57-68
    • Duan, Y.1
  • 64
    • 84949096402 scopus 로고    scopus 로고
    • An adversary model to evaluate DRM protection of video contents on ios devices
    • D'Orazio, C., Choo, K.-K.R., An adversary model to evaluate DRM protection of video contents on ios devices. Comput. Secur. 56 (2016), 94–110.
    • (2016) Comput. Secur. , vol.56 , pp. 94-110
    • D'Orazio, C.1    Choo, K.-K.R.2
  • 65
    • 84986550725 scopus 로고    scopus 로고
    • A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps
    • D'Orazio, C.J., Lu, R., Choo, K.-K.R., Vasilakos, A.V., A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps. Appl. Math. Comput. 293 (2017), 523–544.
    • (2017) Appl. Math. Comput. , vol.293 , pp. 523-544
    • D'Orazio, C.J.1    Lu, R.2    Choo, K.-K.R.3    Vasilakos, A.V.4
  • 66
    • 84947587045 scopus 로고    scopus 로고
    • A forensically sound adversary model for mobile devices
    • Do, Q., Martini, B., Choo, K.-K.R., A forensically sound adversary model for mobile devices. PLoS One 10:9 (2015), 1–15.
    • (2015) PLoS One , vol.10 , Issue.9 , pp. 1-15
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 67
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L., Password authentication with insecure communication. Commun. ACM 24:11 (1981), 770–772.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 68
    • 80051993169 scopus 로고    scopus 로고
    • Fully Homomorphic Encryption over the Integers with Shorter Public Keys
    • Springer Berlin, Heidelberg
    • Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M., Fully Homomorphic Encryption over the Integers with Shorter Public Keys. 2011, Springer, Berlin, Heidelberg, 487–504.
    • (2011) , pp. 487-504
    • Coron, J.-S.1    Mandal, A.2    Naccache, D.3    Tibouchi, M.4
  • 69
    • 85029625540 scopus 로고    scopus 로고
    • Available at
    • Raspberry pi, Available at http://www.raspberrypi.org/.
  • 70
    • 85029645574 scopus 로고    scopus 로고
    • Wikipedia, List of conutries by Internet connection speeds, Available at
    • Wikipedia, List of conutries by Internet connection speeds, Available at https://en.wikipedia.org/wiki/List_of_countries_by_Internet_connection_speeds.
  • 71
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the Internet's multicast backbone (mbone)
    • Almeroth, K.C., Ammar, M.H., Multicast group behavior in the Internet's multicast backbone (mbone). IEEE Commun. Mag. 35:6 (1997), 124–129.
    • (1997) IEEE Commun. Mag. , vol.35 , Issue.6 , pp. 124-129
    • Almeroth, K.C.1    Ammar, M.H.2
  • 73
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • Springer Berlin, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H., Short Group Signatures. 2004, Springer, Berlin, Heidelberg, 41–55.
    • (2004) , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 75
    • 17844407999 scopus 로고    scopus 로고
    • Easy decision diffie-hellman groups
    • Galbraith, S.D., Rotger, V., Easy decision diffie-hellman groups. LMS J. Comput. Math. 7 (2004), 201–218.
    • (2004) LMS J. Comput. Math. , vol.7 , pp. 201-218
    • Galbraith, S.D.1    Rotger, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.