{"id":"https://openalex.org/W4414539171","doi":"https://doi.org/10.1109/icc52391.2025.11160741","title":"SDXE: Accelerating Secure Cloud Deduplication Via SGX in Edge Computing","display_name":"SDXE: Accelerating Secure Cloud Deduplication Via SGX in Edge Computing","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414539171","doi":"https://doi.org/10.1109/icc52391.2025.11160741"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11160741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11160741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100510864","display_name":"Jian Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Wu","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University,Shenzhen,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069247489","display_name":"Yinjin Fu","orcid":"https://orcid.org/0000-0001-9107-1338"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinjin Fu","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University,Shenzhen,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023506057","display_name":"Nong Xiao","orcid":"https://orcid.org/0000-0002-2166-977X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nong Xiao","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100510864"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3790842,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3138","last_page":"3143"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9487000107765198,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9243000149726868,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.8985999822616577},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.641700029373169},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5968000292778015},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5454000234603882},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5321999788284302},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.48500001430511475},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4713999927043915},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4339999854564667},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4180999994277954}],"concepts":[{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.8985999822616577},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.829800009727478},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.641700029373169},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5968000292778015},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5454000234603882},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5321999788284302},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.48500001430511475},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4713999927043915},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4339999854564667},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4278999865055084},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41839998960494995},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4180999994277954},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.41429999470710754},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.33980000019073486},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33180001378059387},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2962000072002411},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.296099990606308},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.29319998621940613},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2639000117778778},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2565000057220459}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11160741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11160741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7088822926","display_name":null,"funder_award_id":"62332021, 62461146204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Secure":[0],"data":[1,17,48,71,96,107,133,138],"deduplication":[2,49,122],"in":[3,34,149,158],"edge":[4],"computing":[5,55],"has":[6],"emerged":[7],"as":[8],"a":[9,46,65,90,99,141],"pivotal":[10],"technique":[11],"to":[12,76,105],"enhance":[13,111,132],"the":[14,24,81,116],"cost-efficiency":[15],"and":[16,37,70,110,161],"security":[18,72],"of":[19],"cloud":[20],"storage":[21,92,108],"infrastructures.":[22],"However,":[23],"prevailing":[25],"methodologies":[26],"predominantly":[27],"rely":[28],"on":[29,95],"resource-intensive":[30],"cryptographic":[31,85],"operations,":[32,79],"resulting":[33],"substantial":[35],"communication":[36,134],"computation":[38],"overheads.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43,88],"introduce":[44],"SDXE:":[45],"secure":[47,121],"framework":[50],"that":[51,128],"leverages":[52],"cloud-edge":[53,119],"collaborative":[54,120],"through":[56],"Intel's":[57],"Software":[58],"Guard":[59],"Extensions":[60],"(SGX).":[61],"It":[62],"can":[63,130],"strike":[64],"balance":[66],"between":[67],"system":[68],"performance":[69],"by":[73],"harnessing":[74],"SGX":[75],"protect":[77],"sensitive":[78],"circumventing":[80],"need":[82],"for":[83],"conventional":[84],"algorithms.":[86],"Additionally,":[87],"propose":[89],"hierarchical":[91],"strategy":[93],"predicated":[94],"temperature,":[97],"alongside":[98],"version-based":[100],"two-level":[101],"fingerprint":[102],"index":[103],"structure,":[104],"optimize":[106],"efficiency":[109,135],"transfer":[112],"performance.":[113],"Comparing":[114],"with":[115,136],"typical":[117],"cryptography-based":[118],"schemes,":[123],"our":[124],"experimental":[125],"results":[126],"demonstrate":[127],"SDXE":[129],"significantly":[131],"high":[137],"security,":[139],"achieving":[140],"remarkable":[142],"<tex":[143,152,162],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[144,153,163],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$9.25":[145],"\\times$</tex>":[146,155,165],"upload":[147,156],"throughput":[148,157],"client-edge":[150],"stage,":[151],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$3.44":[154],"edge-cloud":[159],"stage":[160],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$2.96":[164],"download":[166],"throughput.":[167]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
