An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
With the rapid expansion of Internet of Things (IoT), relevant files are stored and transmitted at the network edge by employing data deduplication to eliminate redundant data for the best accessibility. Although deduplication improves storage and network efficiency, it decreases security strength a...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co. Ltd.
2022-04-01
|
Series: | BenchCouncil Transactions on Benchmarks, Standards and Evaluations |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2772485922000497 |
_version_ | 1797867274709762048 |
---|---|
author | Yukun Zhou Zhibin Yu Liang Gu Dan Feng |
author_facet | Yukun Zhou Zhibin Yu Liang Gu Dan Feng |
author_sort | Yukun Zhou |
collection | DOAJ |
description | With the rapid expansion of Internet of Things (IoT), relevant files are stored and transmitted at the network edge by employing data deduplication to eliminate redundant data for the best accessibility. Although deduplication improves storage and network efficiency, it decreases security strength and performance. Existing schemes usually adopt message-locked encryption (MLE) to encrypt data, which is vulnerable to brute-force attacks. Meanwhile, these schemes utilize proof-of-ownership (PoW) to prevent duplicate-faking attacks, while they suffer from replay attacks or incur large computation overheads. This paper proposes SE-PoW, an efficient and location-aware hybrid encrypted deduplication scheme with a dual-level security-enhanced Proof-of-Ownership in edge computing. Specifically, SE-PoW firstly encrypts files with an inter-edge server-aided randomized convergent encryption (RCE) method and then protects blocks with an intra-edge edge-aided MLE method to balance security and system efficiency. To resist duplicate-faking attacks and replay attacks, SE-PoW performs the dual-level PoW algorithm. Then it combines the verification of a cuckoo filter and the homomorphism of algebraic signatures in sequence to enhance security and improve ownership checking efficiency. Security analysis demonstrates that SE-PoW ensures data security and resists the mentioned attacks. Evaluation results show that SE-PoW reduces up to 61.9% upload time overheads compared with the state-of-the-art schemes. |
first_indexed | 2024-04-09T23:38:47Z |
format | Article |
id | doaj.art-d18ac1f3b18349e29a7c5b8d0f76f985 |
institution | Directory Open Access Journal |
issn | 2772-4859 |
language | English |
last_indexed | 2024-04-09T23:38:47Z |
publishDate | 2022-04-01 |
publisher | KeAi Communications Co. Ltd. |
record_format | Article |
series | BenchCouncil Transactions on Benchmarks, Standards and Evaluations |
spelling | doaj.art-d18ac1f3b18349e29a7c5b8d0f76f9852023-03-20T04:05:15ZengKeAi Communications Co. Ltd.BenchCouncil Transactions on Benchmarks, Standards and Evaluations2772-48592022-04-0122100062An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computingYukun Zhou0Zhibin Yu1Liang Gu2Dan Feng3Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China; Sangfor Technologies Inc, Shenzhen, China; Wuhan National Laboratory for Optoelectronics, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, ChinaShenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China; Corresponding author.Sangfor Technologies Inc, Shenzhen, ChinaWuhan National Laboratory for Optoelectronics, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, ChinaWith the rapid expansion of Internet of Things (IoT), relevant files are stored and transmitted at the network edge by employing data deduplication to eliminate redundant data for the best accessibility. Although deduplication improves storage and network efficiency, it decreases security strength and performance. Existing schemes usually adopt message-locked encryption (MLE) to encrypt data, which is vulnerable to brute-force attacks. Meanwhile, these schemes utilize proof-of-ownership (PoW) to prevent duplicate-faking attacks, while they suffer from replay attacks or incur large computation overheads. This paper proposes SE-PoW, an efficient and location-aware hybrid encrypted deduplication scheme with a dual-level security-enhanced Proof-of-Ownership in edge computing. Specifically, SE-PoW firstly encrypts files with an inter-edge server-aided randomized convergent encryption (RCE) method and then protects blocks with an intra-edge edge-aided MLE method to balance security and system efficiency. To resist duplicate-faking attacks and replay attacks, SE-PoW performs the dual-level PoW algorithm. Then it combines the verification of a cuckoo filter and the homomorphism of algebraic signatures in sequence to enhance security and improve ownership checking efficiency. Security analysis demonstrates that SE-PoW ensures data security and resists the mentioned attacks. Evaluation results show that SE-PoW reduces up to 61.9% upload time overheads compared with the state-of-the-art schemes.http://www.sciencedirect.com/science/article/pii/S2772485922000497DeduplicationMessage-locked encryptionProof of ownershipEdge computing |
spellingShingle | Yukun Zhou Zhibin Yu Liang Gu Dan Feng An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing BenchCouncil Transactions on Benchmarks, Standards and Evaluations Deduplication Message-locked encryption Proof of ownership Edge computing |
title | An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing |
title_full | An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing |
title_fullStr | An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing |
title_full_unstemmed | An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing |
title_short | An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing |
title_sort | efficient encrypted deduplication scheme with security enhanced proof of ownership in edge computing |
topic | Deduplication Message-locked encryption Proof of ownership Edge computing |
url | http://www.sciencedirect.com/science/article/pii/S2772485922000497 |
work_keys_str_mv | AT yukunzhou anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing AT zhibinyu anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing AT lianggu anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing AT danfeng anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing AT yukunzhou efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing AT zhibinyu efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing AT lianggu efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing AT danfeng efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing |