{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:37:02Z","timestamp":1773247022964,"version":"3.50.1"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100017354","name":"Military Crypto Research Center","doi-asserted-by":"crossref","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/100017354","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005073","name":"Agency for Defense Development","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,8,31]]},"abstract":"<jats:p>As an extension of cloud computing, edge computing introduces additional intermediate devices, called edge nodes near clients, providing computing services on behalf of the central cloud more efficiently. Although edge computing brings several benefits such as low latency and bandwidth savings on the edge side, rapid increase in the amount of data transmitted to the central cloud hinders efficient utilization of the storage system on the central cloud side especially when the data from edge devices are encrypted. To mitigate this issue in a privacy-preserving manner, data deduplication techniques for encrypted data have been extensively studied to enhance both the security and efficiency in the conventional cloud system with two different approaches. A server-side secure deduplication approach protects data privacy but impairs network efficiency by allowing duplicate uploads, while a client-side one improves network efficiency but suffers from potential information leakage due to its vulnerability to the side-channel attack. In this article, we propose a hybrid secure deduplication scheme for edge computing, which guarantees both advantages of the aforementioned two approaches. Specifically, our scheme guarantees data privacy by applying the server-side deduplication technique between the client and the edge nodes and maximizes network efficiency through the client-side deduplication technique between the edge nodes and the cloud. In addition, we devise a novel additively homomorphic encryption for efficient deduplication operations in the resource-limited edge nodes. Based on our experimental results, the proposed scheme reduces the communication costs by approximately 2.5 times for a storage server when the duplicate ratio is 50%, and the response time is reduced by about 2 times when the data size is 16 MB.<\/jats:p>\n          <jats:p\/>","DOI":"10.1145\/3537675","type":"journal-article","created":{"date-parts":[[2022,5,14]],"date-time":"2022-05-14T13:10:31Z","timestamp":1652533831000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Secure and Efficient Hybrid Data Deduplication in Edge Computing"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3785-6729","authenticated-orcid":false,"given":"Hyungjune","family":"Shin","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3283-5494","authenticated-orcid":false,"given":"Dongyoung","family":"Koo","sequence":"additional","affiliation":[{"name":"Department of Electronics and Information Engineering, Hansung University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4823-4194","authenticated-orcid":false,"given":"Junbeom","family":"Hur","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,7,25]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"[n.d.]. Amazon Elastic Compute Cloud (EC2). Retrieved fromhttp:\/\/aws.amazon.com\/ec2."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.1995.7974916"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2018.8457469"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_14"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_24"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813630"},{"key":"e_1_3_1_9_2","first-page":"689","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916)","author":"Aviram Nimrod","year":"2016","unstructured":"Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia K\u00e4sper, Shaanan Cohney, Susanne Engels, Christof Paar, and Yuval Shavitt. 2016. DROWN: Breaking TLS using SSLv2. In Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916). USENIX Association, 689\u2013706."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0120-1"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_23"},{"key":"e_1_3_1_12_2","first-page":"179","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security\u201913)","author":"Bellare Mihir","year":"2013","unstructured":"Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. 2013. DupLESS: Server-aided encryption for deduplicated storage. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security\u201913). USENIX Association, 179\u2013194."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.7916\/D8833ZSK"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.14"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9146-9"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_20"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664169"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_1_23_2","volume-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry Craig","year":"2009","unstructured":"Craig Gentry. 2009. A Fully Homomorphic Encryption Scheme. Stanford University."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"e_1_3_1_26_2","unstructured":"Cisco Systems Inc.2015. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. Retrieved from https:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-overview.pdf."},{"key":"e_1_3_1_27_2","unstructured":"Christine Jost Ha Lam Alexander Maximov and Ben Smeets. 2015. Encryption Performance Improvements of the Paillier Cryptosystem. Retrieved from https:\/\/ia.cr\/2015\/864."},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1201\/b17668"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0054"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3356468"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.015"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813623"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"e_1_3_1_35_2","volume-title":"Proceedings of the 20th USENIX Security Symposium (USENIX Security\u201911)","author":"Mulazzani Martin","year":"2011","unstructured":"Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar Weippl. 2011. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. In Proceedings of the 20th USENIX Security Symposium (USENIX Security\u201911). USENIX Association, San Francisco, CA."},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2791432"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.54"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_8"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.058"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2987793"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013792"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2832251"},{"key":"e_1_3_1_48_2","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/978-3-642-34129-8_31","volume-title":"Information and Communications Security","author":"Zhang Ye","year":"2012","unstructured":"Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, and Siu Ming Yiu. 2012. Acceleration of composite order bilinear pairing on graphics hardware. In Information and Communications Security. Springer, Berlin, 341\u2013348."},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2612760"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3537675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:51Z","timestamp":1750186971000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,8,31]]}},"alternative-id":["10.1145\/3537675"],"URL":"https:\/\/doi.org\/10.1145\/3537675","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,25]]},"assertion":[{"value":"2020-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}