Research Article

Balancing Access Control and Privacy for Data Deduplication via Functional Encryption

Table 1

Symbols and notations.

SymbolNotation

fLength of a file
bLength of each file block
Length of the hash value
NNumber of users participating in key aggregation
KTotal number of bloom filters
LLength of bloom filter array
Q(n)Number of common attributes in a user group
nNumber of attributes for an individual user
HashComputational cost of performing a hash function
CE_KComputational cost of performing a key aggregation
EncComputational overhead of performing a symmetric encryption
PoWComputational cost of performing a proof of ownership
AddComputational cost of performing an addition