Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments
Table 1
Comparison of secure deduplication schemes.
CE (MLE)
Server-aided encryption
Serverless encryption
DupLESS
Miao et al.
Duan et al.
Liu et al.
Abadi et al.
SEED
Attack resistance
Brute-force attack
×
○
○
○
○
○
○
Server-comp. attack
×
×
Δ
Δ
○
○
○
Key server requirement
×
○
○
○
×
×
×
File encryption cost
Key computation
H
H + 2M + 2E
H + 2κ + 2E
H + (2 + κ)M + 2E
H + 2HE
H
H + E
Key computation (↔)
—
OPRF
κOPRF
κOPRF
cPAKE
—
—
Ciphertext computation
SE
SE
H + SE
H + SE
SE
S(H + SE + M + E + P)
SE + 3E + P
Tag computation
H
H
H
H
H
2E
E
Lazy encryption
NO
NO
NO
NO
NO
NO
Yes
Deduplication cost
Time complexity
O(log n)
O(log n)
O(log n)
O(log n)
O(log n)
O(n)
O(log n)
H: file hash computation, SE: symmetric encryption, M: group multiplication, E: group exponentiation, P: pairing, HE: homomorphic encryption, k: number of key servers, c: number of online checkers,↔: interactive protocol between user and other entities, s: number of shares, and n: number of files in cloud storage.