Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment


KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 9, pp. 305-316, Sep. 2022
https://doi.org/10.3745/KTCCS.2022.11.9.305,   PDF Download:
Keywords: Edge Computing, Privacy, Efficiency, Duplicate Elimination, Trusted Execution Environment
Abstract

With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
D. Koo, "Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment," KIPS Transactions on Computer and Communication Systems, vol. 11, no. 9, pp. 305-316, 2022. DOI: https://doi.org/10.3745/KTCCS.2022.11.9.305.

[ACM Style]
Dongyoung Koo. 2022. Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment. KIPS Transactions on Computer and Communication Systems, 11, 9, (2022), 305-316. DOI: https://doi.org/10.3745/KTCCS.2022.11.9.305.