Deduplication on Encrypted Big Data in Cloud
Reads0
Chats0
TLDR
This paper proposes a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption that integrates cloud data dedUplication with access control and evaluates its performance based on extensive analysis and computer simulations.Abstract:
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in cloud. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. They cannot flexibly support data access control and revocation. Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The results show the superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage.read more
Citations
More filters
Journal ArticleDOI
A hybrid model of Internet of Things and cloud computing to manage big data in health services applications
Mohamed Elhoseny,Ahmed Abdelaziz,Ahmed Salama,Ahmed Salama,Alaa Riad,Khan Muhammad,Arun Kumar Sangaiah +6 more
TL;DR: A new model to optimize virtual machines selection in cloud-IoT health services applications to efficiently manage a big amount of data in integrated industry 4.0 applications is proposed and outperforms on the state-of-the-art models in total execution time and the system efficiency.
Journal ArticleDOI
Big data privacy: a technological perspective and review
TL;DR: This paper covers uses of privacy by taking existing methods such as HybrEx, k-anonymity, T-closeness and L-diversity and its implementation in business and presents recent techniques of privacy preserving in big data.
Journal ArticleDOI
Big Data Meet Cyber-Physical Systems: A Panoramic Survey
TL;DR: This paper presents the CPS taxonomy via providing a broad overview of data collection, storage, access, processing, and analysis, and discusses big data meeting green challenges in the contexts of CPS.
Journal ArticleDOI
Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy
TL;DR: An image color coding method aimed at increasing the security of keyframes extracted from diagnostic hysteroscopy videos using video summarization using a 2-D logistic map, which relies on mixing and cascading the orbits of the chaotic map in order to generate the stream keys for the encryption algorithm.
Journal ArticleDOI
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs
TL;DR: This paper investigates the cloud-based road condition monitoring (RCoM) scenario, where the authority needs to monitor real-time road conditions with the help of a cloud server so that it could make sound responses to emergency cases timely.
References
More filters
Journal ArticleDOI
Improved proxy re-encryption schemes with applications to secure distributed storage
TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Journal ArticleDOI
Security in cloud computing
TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.
Proceedings ArticleDOI
Reclaiming space from duplicate files in a serverless distributed file system
TL;DR: This work presents a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication, and includes convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys.
Journal ArticleDOI
Big data analytics: a survey
Chun-Wei Tsai,Chin-Feng Lai,Han-Chieh Chao,Han-Chieh Chao,Han-Chieh Chao,Athanasios V. Vasilakos +5 more
TL;DR: The question that arises now is, how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data.
Journal ArticleDOI
A study of practical deduplication
TL;DR: In this paper, the authors collected file system content data from 857 desktop computers at Microsoft over a span of four weeks and analyzed the data to determine the relative efficacy of data deduplication, particularly considering whole file versus block-level elimination of redundancy.