DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments

被引:0
|
作者
Ghassabi, Kiana [1 ]
Pahlevani, Peyman [1 ]
机构
[1] Inst Adv Studies Basic Sci IASBS, Dept Comp Sci, Zanjan 4515768315, Iran
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Tokenization; Encryption; Task analysis; Computational modeling; Side-channel attacks; Navigation; Servers; Text recognition; Text processing; Cloud service provider; compression; secure data deduplication; textual data deduplication; SIDE CHANNELS;
D O I
10.1109/ACCESS.2024.3402544
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of textual data in Vision-and-Language Navigation tasks poses significant challenges for data management in large-scale storage systems. Data deduplication has emerged as a practical strategy for data reduction in large-scale storage systems; however, it has also raised security concerns. This paper introduces DEDUCT, an innovative data deduplication method for textual data. DEDUCT employs a hybrid approach that combines cloud-side and client-side deduplication mechanisms to achieve high compression rates while maintaining data security. DEDUCT's lightweight preprocessing and client-side deduplication make it suitable for resource-constrained devices like IoT devices. It has also been designed to resist side-channel attacks. Experimental evaluations on the Touchdown dataset, consisting of human-written navigation instructions for routes, demonstrate the effectiveness of DEDUCT. It achieves compression rates of nearly 66%, significantly reducing storage requirements while preserving the confidentiality of textual data. This substantial reduction in storage demands can lead to significant cost savings and improved efficiency in large-scale data management systems.
引用
收藏
页码:70743 / 70758
页数:16
相关论文
共 50 条
  • [1] Secure Enterprise Data Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 367 - 374
  • [2] Secure Data Deduplication with Reliable Data Deletion in Cloud
    Meng, Wenjuan
    Ge, Jianhua
    Jiang, Tao
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 551 - 570
  • [3] Secure Encrypted Data With Authorized Deduplication in Cloud
    Xiong, Jinbo
    Zhang, Yuanyuan
    Tang, Shaohua
    Liu, Ximeng
    Yao, Zhiqiang
    IEEE ACCESS, 2019, 7 : 75090 - 75104
  • [4] A hybrid encryption for secure data deduplication the cloud
    Ebinazer S.E.
    Savarimuthu N.
    Bhanu S.M.S.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 295 - 307
  • [5] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [6] Secure Cloud Encrypted Data Deduplication Method
    Zhang S.-G.
    Xian H.-Q.
    Wang L.-M.
    Liu H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (12): : 3815 - 3828
  • [7] Secure Textual Data Deduplication Scheme Based on Data Encoding and Compression
    Miri, Ali
    Rashid, Fatema
    2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2019, : 207 - 211
  • [8] A Secure Client Side Deduplication Scheme in Cloud Storage Environments
    Kaaniche, Nesrine
    Laurent, Maryline
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [9] Survey on Data Deduplication in Cloud Storage Environments
    Kim, Won-Bin
    Lee, Im-Yeong
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (03): : 658 - 673
  • [10] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370