• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ½Å·Ú½ÇÇàȯ°æ±â¹Ý ¿§ÁöÄÄÇ»Æà ȯ°æ¿¡¼­ÀÇ ¾ÏÈ£¹®¿¡ ´ëÇÑ È¿À²Àû ÇÁ¶óÀ̹ö½Ã º¸Á¸ µ¥ÀÌÅÍ Áߺ¹Á¦°Å
¿µ¹®Á¦¸ñ(English Title) Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment
ÀúÀÚ(Author) Dongyoung Koo   ±¸µ¿¿µ  
¿ø¹®¼ö·Ïó(Citation) VOL 11 NO. 09 PP. 0305 ~ 0316 (2022. 09)
Çѱ۳»¿ë
(Korean Abstract)
»ç¹°ÀÎÅÍ³Ý ¹× ºòµ¥ÀÌÅÍ µî µðÁöÅÐ µ¥ÀÌÅÍÀÇ ¹ü¶÷À¸·Î, ´Ù¼ö »ç¿ëÀڷκÎÅÍ ¹æ´ëÇÑ µ¥ÀÌÅ͸¦ ó¸® ¹× º¸°üÇϴ Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚ´Â È¿À²Àû µ¥ÀÌÅÍ °ü¸®¸¦ À§ÇÑ µ¥ÀÌÅÍ Áߺ¹Á¦°Å¸¦ Àû¿ëÇÒ ¼ö ÀÖ´Ù. Áß¾Ó Å¬¶ó¿ìµå ¼­¹ö·ÎÀÇ ³×Æ®¿öÅ© È¥Àâ ¹× ¿¬»ê È¿À²¼º ÀúÇÏ µîÀÇ ¹®Á¦¸¦ °³¼±Çϱâ À§ÇÑ Å¬¶ó¿ìµåÀÇ È®ÀåÀ¸·Î ¿§Áö ÄÄÇ»Æà °³³äÀÌ µµÀԵǸ鼭 »ç¿ëÀÚ °æÇèÀ» °³¼±ÇÒ ¼ö ÀÖÀ¸³ª, ÀüÀûÀ¸·Î ½Å·ÚÇÒ ¼ö ¾ø´Â »õ·Î¿î ¿§Áö µð¹ÙÀ̽ºÀÇ Ãß°¡·Î ÀÎÇÏ¿© ÇÁ¶óÀ̹ö½Ã º¸Á¸ µ¥ÀÌÅÍ Áߺ¹Á¦°Å¸¦ À§ÇÑ ¾ÏÈ£ÇÐÀû ¿¬»ê º¹ÀâµµÀÇ Áõ°¡¸¦ ¾ß±âÇÒ ¼ö ÀÖ´Ù. Á¦¾È ±â¹ý¿¡¼­´Â ½Å·Ú½ÇÇàȯ°æÀ» È°¿ëÇÔÀ¸·Î½á »ç¿ëÀÚ-¿§Áö-Ŭ¶ó¿ìµå °£ ÃÖÀûÈ­µÈ Åë½Å ±¸Á¶¿¡¼­ ÇÁ¶óÀ̹ö½Ã º¸Á¸ µ¥ÀÌÅÍ Áߺ¹Á¦°ÅÀÇ È¿À²¼º °³¼± ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù. »ç¿ëÀÚ¿Í Å¬¶ó¿ìµå »çÀÌ¿¡¼­ÀÇ ºñ¹ÐÁ¤º¸ °øÀ¯¸¦ ÅëÇÏ¿© ¿§Áö µð¹ÙÀ̽º¿¡¼­ÀÇ ¿¬»ê º¹Àâµµ¸¦ ÃÖ¼ÒÈ­ÇÏ°í, Ŭ¶ó¿ìµå ¼­ºñ½º Á¦°øÀÚÀÇ È¿À²Àû ¾Ïȣȭ ¾Ë°í¸®Áò »ç¿ëÀ» °¡´ÉÇÏ°Ô ÇÑ´Ù. ¶ÇÇÑ, »ç¿ëÀÚ´Â ¿§Áö µð¹ÙÀ̽º¿¡ µ¥ÀÌÅ͸¦ ¿ÀÇÁ·ÎµùÇÔÀ¸·Î½á µ¥ÀÌÅÍ Áߺ¹Á¦°Å¿Í µ¶¸³ÀûÀÎ È°µ¿À» °¡´ÉÇÏ°Ô ÇÏ¿© »ç¿ëÀÚ °æÇèÀ» °³¼±ÇÑ´Ù. ½ÇÇèÀ» ÅëÇÏ¿© Á¦¾È ±â¹ýÀÌ µ¥ÀÌÅÍ ÇÁ¶óÀ̹ö½Ã º¸Á¸ Áߺ¹Á¦°Å °úÁ¤¿¡¼­ ¿§Áö-Ŭ¶ó¿ìµå Åë½Å È¿À²¼º Çâ»ó, ¿§Áö ¿¬»ê È¿À²¼º Çâ»ó µî ¼º´É °³¼± È¿°ú°¡ ÀÖÀ½À» È®ÀÎÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.
Å°¿öµå(Keyword) Edge Computing   Privacy   Efficiency   Duplicate Elimination   Trusted Execution Environment   ¿§Áö ÄÄÇ»Æà  ÇÁ¶óÀ̹ö½Ã   È¿À²¼º   Áߺ¹Á¦°Å   ½Å·Ú½ÇÇàȯ°æ  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå