Abstract

Since the emergence of the mobile edge computing (MEC) paradigm, data leakage has become a serious threat against edge computing users, thwarting the further applications of MEC. Previous studies concentrating on data storage security and deduplication for conventional cloud computing paradigm cannot be simply adapted to edge computing because a central coordinator (for example, a cloud server) with a global view is not always available in MEC. To tackle this problem, we take the particular properties of MEC into consideration and propose secure data deduplication schemes for three MEC settings (i.e., centralized, semi-distributed and distributed settings). All of our schemes can provide secure data storage, retrieval, sharing, and deduplication. Through theoretical analysis, we prove the security of our schemes against typical attacks in outsourced data storage. Experimental results with a real-world deployment environment have showed that our schemes can guarantee service quality of MEC effectively.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call