Research Article

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

Table 1

Comparison of secure deduplication schemes.

CE (MLE)Server-aided encryptionServerless encryption
DupLESSMiao et al.Duan et al.Liu et al.Abadi et al.SEED

Attack resistanceBrute-force attack×
Server-comp. attack××ΔΔ

Key server requirement××××

File encryption costKey computationHH + 2M + 2EH + 2κ + 2EH + (2 + κ)M + 2EH + 2HEHH + E
Key computation (↔)OPRFκOPRFκOPRFcPAKE
Ciphertext computationSESEH + SEH + SESES(H + SE + M + E + P)SE + 3E + P
Tag computationHHHHH2EE

Lazy encryptionNONONONONONOYes

Deduplication costTime complexityO(log n)O(log n)O(log n)O(log n)O(log n)O(n)O(log n)

H: file hash computation, SE: symmetric encryption, M: group multiplication, E: group exponentiation, P: pairing, HE: homomorphic encryption, k: number of key servers, c: number of online checkers,↔: interactive protocol between user and other entities, s: number of shares, and n: number of files in cloud storage.