An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing

With the rapid expansion of Internet of Things (IoT), relevant files are stored and transmitted at the network edge by employing data deduplication to eliminate redundant data for the best accessibility. Although deduplication improves storage and network efficiency, it decreases security strength a...

Full description

Bibliographic Details
Main Authors: Yukun Zhou, Zhibin Yu, Liang Gu, Dan Feng
Format: Article
Language:English
Published: KeAi Communications Co. Ltd. 2022-04-01
Series:BenchCouncil Transactions on Benchmarks, Standards and Evaluations
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2772485922000497
_version_ 1797867274709762048
author Yukun Zhou
Zhibin Yu
Liang Gu
Dan Feng
author_facet Yukun Zhou
Zhibin Yu
Liang Gu
Dan Feng
author_sort Yukun Zhou
collection DOAJ
description With the rapid expansion of Internet of Things (IoT), relevant files are stored and transmitted at the network edge by employing data deduplication to eliminate redundant data for the best accessibility. Although deduplication improves storage and network efficiency, it decreases security strength and performance. Existing schemes usually adopt message-locked encryption (MLE) to encrypt data, which is vulnerable to brute-force attacks. Meanwhile, these schemes utilize proof-of-ownership (PoW) to prevent duplicate-faking attacks, while they suffer from replay attacks or incur large computation overheads. This paper proposes SE-PoW, an efficient and location-aware hybrid encrypted deduplication scheme with a dual-level security-enhanced Proof-of-Ownership in edge computing. Specifically, SE-PoW firstly encrypts files with an inter-edge server-aided randomized convergent encryption (RCE) method and then protects blocks with an intra-edge edge-aided MLE method to balance security and system efficiency. To resist duplicate-faking attacks and replay attacks, SE-PoW performs the dual-level PoW algorithm. Then it combines the verification of a cuckoo filter and the homomorphism of algebraic signatures in sequence to enhance security and improve ownership checking efficiency. Security analysis demonstrates that SE-PoW ensures data security and resists the mentioned attacks. Evaluation results show that SE-PoW reduces up to 61.9% upload time overheads compared with the state-of-the-art schemes.
first_indexed 2024-04-09T23:38:47Z
format Article
id doaj.art-d18ac1f3b18349e29a7c5b8d0f76f985
institution Directory Open Access Journal
issn 2772-4859
language English
last_indexed 2024-04-09T23:38:47Z
publishDate 2022-04-01
publisher KeAi Communications Co. Ltd.
record_format Article
series BenchCouncil Transactions on Benchmarks, Standards and Evaluations
spelling doaj.art-d18ac1f3b18349e29a7c5b8d0f76f9852023-03-20T04:05:15ZengKeAi Communications Co. Ltd.BenchCouncil Transactions on Benchmarks, Standards and Evaluations2772-48592022-04-0122100062An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computingYukun Zhou0Zhibin Yu1Liang Gu2Dan Feng3Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China; Sangfor Technologies Inc, Shenzhen, China; Wuhan National Laboratory for Optoelectronics, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, ChinaShenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China; Corresponding author.Sangfor Technologies Inc, Shenzhen, ChinaWuhan National Laboratory for Optoelectronics, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, ChinaWith the rapid expansion of Internet of Things (IoT), relevant files are stored and transmitted at the network edge by employing data deduplication to eliminate redundant data for the best accessibility. Although deduplication improves storage and network efficiency, it decreases security strength and performance. Existing schemes usually adopt message-locked encryption (MLE) to encrypt data, which is vulnerable to brute-force attacks. Meanwhile, these schemes utilize proof-of-ownership (PoW) to prevent duplicate-faking attacks, while they suffer from replay attacks or incur large computation overheads. This paper proposes SE-PoW, an efficient and location-aware hybrid encrypted deduplication scheme with a dual-level security-enhanced Proof-of-Ownership in edge computing. Specifically, SE-PoW firstly encrypts files with an inter-edge server-aided randomized convergent encryption (RCE) method and then protects blocks with an intra-edge edge-aided MLE method to balance security and system efficiency. To resist duplicate-faking attacks and replay attacks, SE-PoW performs the dual-level PoW algorithm. Then it combines the verification of a cuckoo filter and the homomorphism of algebraic signatures in sequence to enhance security and improve ownership checking efficiency. Security analysis demonstrates that SE-PoW ensures data security and resists the mentioned attacks. Evaluation results show that SE-PoW reduces up to 61.9% upload time overheads compared with the state-of-the-art schemes.http://www.sciencedirect.com/science/article/pii/S2772485922000497DeduplicationMessage-locked encryptionProof of ownershipEdge computing
spellingShingle Yukun Zhou
Zhibin Yu
Liang Gu
Dan Feng
An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
BenchCouncil Transactions on Benchmarks, Standards and Evaluations
Deduplication
Message-locked encryption
Proof of ownership
Edge computing
title An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
title_full An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
title_fullStr An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
title_full_unstemmed An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
title_short An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
title_sort efficient encrypted deduplication scheme with security enhanced proof of ownership in edge computing
topic Deduplication
Message-locked encryption
Proof of ownership
Edge computing
url http://www.sciencedirect.com/science/article/pii/S2772485922000497
work_keys_str_mv AT yukunzhou anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing
AT zhibinyu anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing
AT lianggu anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing
AT danfeng anefficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing
AT yukunzhou efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing
AT zhibinyu efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing
AT lianggu efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing
AT danfeng efficientencrypteddeduplicationschemewithsecurityenhancedproofofownershipinedgecomputing