scispace - formally typeset
Open AccessJournal ArticleDOI

Deduplication on Encrypted Big Data in Cloud

Reads0
Chats0
TLDR
This paper proposes a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption that integrates cloud data dedUplication with access control and evaluates its performance based on extensive analysis and computer simulations.
Abstract
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in cloud. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. They cannot flexibly support data access control and revocation. Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The results show the superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage.

read more

Citations
More filters
Journal ArticleDOI

A hybrid model of Internet of Things and cloud computing to manage big data in health services applications

TL;DR: A new model to optimize virtual machines selection in cloud-IoT health services applications to efficiently manage a big amount of data in integrated industry 4.0 applications is proposed and outperforms on the state-of-the-art models in total execution time and the system efficiency.
Journal ArticleDOI

Big data privacy: a technological perspective and review

TL;DR: This paper covers uses of privacy by taking existing methods such as HybrEx, k-anonymity, T-closeness and L-diversity and its implementation in business and presents recent techniques of privacy preserving in big data.
Journal ArticleDOI

Big Data Meet Cyber-Physical Systems: A Panoramic Survey

TL;DR: This paper presents the CPS taxonomy via providing a broad overview of data collection, storage, access, processing, and analysis, and discusses big data meeting green challenges in the contexts of CPS.
Journal ArticleDOI

Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy

TL;DR: An image color coding method aimed at increasing the security of keyframes extracted from diagnostic hysteroscopy videos using video summarization using a 2-D logistic map, which relies on mixing and cascading the orbits of the chaotic map in order to generate the stream keys for the encryption algorithm.
Journal ArticleDOI

Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs

TL;DR: This paper investigates the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely.
References
More filters
Journal ArticleDOI

Improved proxy re-encryption schemes with applications to secure distributed storage

TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Journal ArticleDOI

Security in cloud computing

TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.
Proceedings ArticleDOI

Reclaiming space from duplicate files in a serverless distributed file system

TL;DR: This work presents a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication, and includes convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys.
Journal ArticleDOI

Big data analytics: a survey

TL;DR: The question that arises now is, how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data.
Journal ArticleDOI

A study of practical deduplication

TL;DR: In this paper, the authors collected file system content data from 857 desktop computers at Microsoft over a span of four weeks and analyzed the data to determine the relative efficacy of data deduplication, particularly considering whole file versus block-level elimination of redundancy.
Related Papers (5)