Secure and efficient big data deduplication in fog computing
With the rapid development of the Internet of Things, the massive amount of big data generated by the Internet of Things terminals and the real-time processing requirements have brought enormous challenges. A two-tier computing model consisting solely of two entities, cloud and user, will not be sufficient to support processing large numbers of concurrent data requests. Therefore, fog computing was proposed. How to realize the secure and efficient deduplication of ciphertext in fog computing has become a new research topic. In this paper, we firstly present a new decentralized deduplication structure and then show how to apply it to construct a secure and efficient big data deduplication scheme in fog computing. The cloud server, in the proposed paper, can quickly determine which fog server needs to be traversed to search duplicate data, and instead of traversing all fog servers. This significantly improves the efficiency of big data deduplication in fog computing. Furthermore, the proposed scheme allows fog server to verify whether the user possesses the ownership of the data. Performance analysis and experimental results show the proposed scheme has less overheads than existing schemes.
KeywordsFog computing Secure deduplication Proof of ownership Efficiency
This work was supported in part by the National Natural Science Foundation of China under Grant 61070164 and Grant 61272415, in part by the Natural Science Foundation of Guangdong Provience, China, under Grant S2012010008767, in part by the Science and Technology Planning Project of Guangdong Provience, China, under Grant 2013B010401015, and in part by the Zhuhai Top Discipline-Information Security.
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
- Boneh D, Gentry C, Lynn B et al (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 416–432Google Scholar
- Cui H, Deng RH, Li Y et al (2017) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data. https://doi.org/10.1109/TBDATA.2017.2656120
- Douceur JR, Adya A, Bolosky WJ et al (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems. IEEE, pp 617–624Google Scholar
- Fu Y, Xiao N, Jiang H et al (2017) Application-aware big data deduplication in cloud environment. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2017.2710043
- Gou Z, Yamaguchi S, Gupta BB (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity theft: breakthroughs in research and practice. IGI Global, pp 221–247Google Scholar
- Halevi S, Harnik D, Pinkas B et al (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security. ACM, pp 491–500Google Scholar
- Koo D, Shin Y, Yun J et al (2016) A hybrid deduplication for secure and efficient data outsourcing in fog Computing. In: 2016 IEEE international conference on cloud computing technology and science (CloudCom). IEEE, pp 285–293Google Scholar
- Mishra S, Singh S, Ali ST (2018) MPoWS: merged proof of ownership and storage for block level deduplication in cloud storage. In: 2018 9th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1–7Google Scholar
- Ni J, Zhang K, Yu Y et al (2018) Providing task allocation and secure deduplication for mobile crowdsensing via fog computing[J]. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2018.2791432
- Pooranian Z, Chen KC, Yu CM et al (2018) RARE: defeating side channels based on data-deduplication in cloud storage. In: IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 444–449Google Scholar
- Shin Y, Koo D, Yun J et al (2017b) Decentralized server-aided encryption for secure deduplication in cloud storage. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2017.2748594
- Stergiou C, Psannis KE, Xifilidis T et al (2018) Security and privacy of big data for social networking services in cloud. In:IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 438–443Google Scholar
- Xiong J, Zhang Y, Lin L et al (2017) ms-PoSW: a multi-server aided proof of shared ownership scheme for secure deduplication in cloud. Concurr Comput: Pract Exp. https://doi.org/10.1002/cpe.4252
- Yang X, Lu R, Choo KKR et al (2017) Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Trans Big Data. https://doi.org/10.1109/TBDATA.2017.2721444
- Yu CM, Gochhayat SP, Conti M et al (2018) Privacy aware data deduplication for side channel in cloud storage. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2018.2794542