Xin Yao , Chenxi Li , Jiawei Guo , Kecheng Huang , Ting Yao , Ming Zhao
{"title":"TrustDedup: Secure data deduplication for IoT based on end–edge–cloud collaboration","authors":"Xin Yao , Chenxi Li , Jiawei Guo , Kecheng Huang , Ting Yao , Ming Zhao","doi":"10.1016/j.sysarc.2025.103541","DOIUrl":null,"url":null,"abstract":"<div><div>In Internet of Things (IoT)-enabled smart societies, the rapid growth of IoT devices has led to a substantial amount of redundant data stored in the cloud, significantly reducing storage efficiency. Although data deduplication effectively addresses redundancy, it introduces security concerns related to data confidentiality and ownership verification, particularly in semi-trusted cloud environments. Current deduplication methods primarily focus on cloud-only models and fail to accommodate the emerging end–edge–cloud collaborative framework driven by edge computing. To address these challenges, this paper proposes <span>TrustDedup</span>, a secure and efficient deduplication scheme that integrates edge–cloud collaboration and blockchain technology. The proposed scheme employs convergent encryption for secure data deduplication, uses blockchain-based smart contracts for transparent ownership verification, and includes a two-tiered deduplication approach to enhance efficiency and mitigate label inconsistency attacks. Security analyses and experimental results demonstrate that the proposed solution effectively improves deduplication efficiency and ensures robust data security in IoT scenarios.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"168 ","pages":"Article 103541"},"PeriodicalIF":4.1000,"publicationDate":"2025-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Systems Architecture","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1383762125002139","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
In Internet of Things (IoT)-enabled smart societies, the rapid growth of IoT devices has led to a substantial amount of redundant data stored in the cloud, significantly reducing storage efficiency. Although data deduplication effectively addresses redundancy, it introduces security concerns related to data confidentiality and ownership verification, particularly in semi-trusted cloud environments. Current deduplication methods primarily focus on cloud-only models and fail to accommodate the emerging end–edge–cloud collaborative framework driven by edge computing. To address these challenges, this paper proposes TrustDedup, a secure and efficient deduplication scheme that integrates edge–cloud collaboration and blockchain technology. The proposed scheme employs convergent encryption for secure data deduplication, uses blockchain-based smart contracts for transparent ownership verification, and includes a two-tiered deduplication approach to enhance efficiency and mitigate label inconsistency attacks. Security analyses and experimental results demonstrate that the proposed solution effectively improves deduplication efficiency and ensures robust data security in IoT scenarios.
期刊介绍:
The Journal of Systems Architecture: Embedded Software Design (JSA) is a journal covering all design and architectural aspects related to embedded systems and software. It ranges from the microarchitecture level via the system software level up to the application-specific architecture level. Aspects such as real-time systems, operating systems, FPGA programming, programming languages, communications (limited to analysis and the software stack), mobile systems, parallel and distributed architectures as well as additional subjects in the computer and system architecture area will fall within the scope of this journal. Technology will not be a main focus, but its use and relevance to particular designs will be. Case studies are welcome but must contribute more than just a design for a particular piece of software.
Design automation of such systems including methodologies, techniques and tools for their design as well as novel designs of software components fall within the scope of this journal. Novel applications that use embedded systems are also central in this journal. While hardware is not a part of this journal hardware/software co-design methods that consider interplay between software and hardware components with and emphasis on software are also relevant here.