389 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author강경태-
dc.date.accessioned2019-12-05T02:42:49Z-
dc.date.available2019-12-05T02:42:49Z-
dc.date.issued2019-07-
dc.identifier.citationPEER-TO-PEER NETWORKING AND APPLICATIONS, v. 12, No. 4, Page. 850-864en_US
dc.identifier.issn1936-6442-
dc.identifier.issn1936-6450-
dc.identifier.urihttps://link.springer.com/article/10.1007%2Fs12083-018-0682-9-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/117409-
dc.description.abstractA secure deduplication technique removes duplicate data and stores only single copy to efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a necessary technology for resource-limited for devices to save storages. However, most of the existing deduplication schemes based on convergent encryption suffer from 1) a convergent encryption key management problem and 2) a dynamic ownership management problem. In key management, convergent encryption generates a number of encryption keys whose size increases linearly with the number of distinct data. In terms of dynamic ownership management, although the ownership of data in a fog device or cloud storage frequently changes in real-world applications, supporting ownership changes are difficult because the convergent encryption keys are only bound to the data. In order to solve these problems, we present a secure deduplication scheme that features reliable and scalable key management based on pairing-based cryptography and supports dynamic ownership management. The proposed scheme avoids additional costs associated with distributing key components on secure channels and ownership keys on the user side yet guarantees secure key and ownership management.en_US
dc.description.sponsorshipThis work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2018-0-00269, A research on safe and convenient big data processing methods) (No.2017-0-00184, Self-Learning Cyber Immune Technology Development) (2014-0-00065, Resilient Cyber-Physical Systems Research). This work was also supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2016R1A2A2A05005402).en_US
dc.language.isoen_USen_US
dc.publisherSPRINGERen_US
dc.subjectFog computing securityen_US
dc.subjectFault tolerant key managementen_US
dc.subjectDynamic ownershipen_US
dc.subjectSecure deduplicationen_US
dc.titleSecure Deduplication with Reliable and Revocable Key Management in Fog Computingen_US
dc.typeArticleen_US
dc.relation.no4-
dc.relation.volume12-
dc.identifier.doi10.1007/s12083-018-0682-9-
dc.relation.page850-864-
dc.relation.journalPEER-TO-PEER NETWORKING AND APPLICATIONS-
dc.contributor.googleauthorKwon, Hyunsoo-
dc.contributor.googleauthorHahn, Changhee-
dc.contributor.googleauthorKang, Kyungtae-
dc.contributor.googleauthorHur, Junbeom-
dc.relation.code2019037897-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF COMPUTING[E]-
dc.sector.departmentDIVISION OF COMPUTER SCIENCE-
dc.identifier.pidktkang-
Appears in Collections:
COLLEGE OF COMPUTING[E](소프트웨어융합대학) > COMPUTER SCIENCE(소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE