TY - GEN
T1 - A hybrid deduplication for secure and efficient data outsourcing in fog computing
AU - Koo, Dongyoung
AU - Shin, Youngjoo
AU - Yun, Joobeom
AU - Hur, Junbeom
N1 - Funding Information:
This work was supported by a Korea University Grant. This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No.2016R1A2A2A05005402). This work was also supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government( MSIP) (No.B0717-16-0128, Research on security model for fog computing platform).
Publisher Copyright:
© 2016 IEEE.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2016/7/2
Y1 - 2016/7/2
N2 - With prevalence of remote storage services, data privacy issues become more serious owing to loss of control to outsourced data. In the meanwhile, the service providers tend to minimize storage utility costs. To minimize the storage costs while preserving data privacy, secure deduplication techniques have been proposed, which are categorized into client-side or server-side approaches. Client-side approach achieves storage and bandwidth savings at the same time but allows external adversaries to know existence of duplicates in the remote storage. On the contrary, server-side one prevents the adversaries from getting acknowledged but sacrifices network bandwidth savings. In fog computing, however, which is a new computing paradigm extending the cloud computing by outsourcing a centralized workload of the cloud to geographically distributed fog devices located at the edge of the networks, the previous deduplication schemes cannot guarantee efficiency improvement and privacy preservation simultaneously. In this paper, we present a simple but nontrivial solution of these contradictory issues in fog storage. The proposed hybrid secure deduplication protocol combines client-and server-side deduplications by taking untrustworthy fog storage environments into account. The client-side deduplication is applied in inter-network (i.e., cloud-fog network) communications to prevent network congestion at the network core, while the server-side deduplication is adopted in intra-network (i.e., user-fog network) communications to prevent information leakage via side channels for maximal data privacy. Performance and security analyses demonstrate the comparable efficiency of the proposed scheme with security enhancement.
AB - With prevalence of remote storage services, data privacy issues become more serious owing to loss of control to outsourced data. In the meanwhile, the service providers tend to minimize storage utility costs. To minimize the storage costs while preserving data privacy, secure deduplication techniques have been proposed, which are categorized into client-side or server-side approaches. Client-side approach achieves storage and bandwidth savings at the same time but allows external adversaries to know existence of duplicates in the remote storage. On the contrary, server-side one prevents the adversaries from getting acknowledged but sacrifices network bandwidth savings. In fog computing, however, which is a new computing paradigm extending the cloud computing by outsourcing a centralized workload of the cloud to geographically distributed fog devices located at the edge of the networks, the previous deduplication schemes cannot guarantee efficiency improvement and privacy preservation simultaneously. In this paper, we present a simple but nontrivial solution of these contradictory issues in fog storage. The proposed hybrid secure deduplication protocol combines client-and server-side deduplications by taking untrustworthy fog storage environments into account. The client-side deduplication is applied in inter-network (i.e., cloud-fog network) communications to prevent network congestion at the network core, while the server-side deduplication is adopted in intra-network (i.e., user-fog network) communications to prevent information leakage via side channels for maximal data privacy. Performance and security analyses demonstrate the comparable efficiency of the proposed scheme with security enhancement.
KW - Data outsourcing
KW - client-side deduplication
KW - data privacy
KW - efficiency
KW - fog computing
KW - server-side deduplication
UR - http://www.scopus.com/inward/record.url?scp=85012964486&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85012964486&partnerID=8YFLogxK
U2 - 10.1109/CloudCom.2016.0054
DO - 10.1109/CloudCom.2016.0054
M3 - Conference contribution
AN - SCOPUS:85012964486
T3 - Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
SP - 285
EP - 293
BT - Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016
PB - IEEE Computer Society
T2 - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016
Y2 - 12 December 2016 through 15 December 2016
ER -