DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments

被引:0
|
作者
Ghassabi, Kiana [1 ]
Pahlevani, Peyman [1 ]
机构
[1] Inst Adv Studies Basic Sci IASBS, Dept Comp Sci, Zanjan 4515768315, Iran
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Tokenization; Encryption; Task analysis; Computational modeling; Side-channel attacks; Navigation; Servers; Text recognition; Text processing; Cloud service provider; compression; secure data deduplication; textual data deduplication; SIDE CHANNELS;
D O I
10.1109/ACCESS.2024.3402544
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of textual data in Vision-and-Language Navigation tasks poses significant challenges for data management in large-scale storage systems. Data deduplication has emerged as a practical strategy for data reduction in large-scale storage systems; however, it has also raised security concerns. This paper introduces DEDUCT, an innovative data deduplication method for textual data. DEDUCT employs a hybrid approach that combines cloud-side and client-side deduplication mechanisms to achieve high compression rates while maintaining data security. DEDUCT's lightweight preprocessing and client-side deduplication make it suitable for resource-constrained devices like IoT devices. It has also been designed to resist side-channel attacks. Experimental evaluations on the Touchdown dataset, consisting of human-written navigation instructions for routes, demonstrate the effectiveness of DEDUCT. It achieves compression rates of nearly 66%, significantly reducing storage requirements while preserving the confidentiality of textual data. This substantial reduction in storage demands can lead to significant cost savings and improved efficiency in large-scale data management systems.
引用
收藏
页码:70743 / 70758
页数:16
相关论文
共 50 条
  • [21] A Review on Secure Data Deduplication: Cloud Storage Security Issue
    Prajapati, Priteshkumar
    Shah, Parth
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 3996 - 4007
  • [22] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [23] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [24] Secure Cloud Data Deduplication with Efficient Re-Encryption
    Yuan, Haoran
    Chen, Xiaofeng
    Li, Jin
    Jiang, Tao
    Wang, Jianfeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 442 - 456
  • [25] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    Cluster Computing, 2024, 27 : 2203 - 2215
  • [26] A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [27] A secure authorized deduplication scheme for cloud data based on blockchain
    Zhang, Guipeng
    Yang, Zhenguo
    Xie, Haoran
    Liu, Wenyin
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
  • [28] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [29] Secure deduplication for multimedia data with user revocation in cloud storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5889 - 5903
  • [30] Blockchain based secure medical data outsourcing with data deduplication in cloud environment
    Benil, T.
    Jasper, J.
    COMPUTER COMMUNICATIONS, 2023, 209 : 1 - 13