Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud

被引:24
|
作者
Yang, Xue [1 ]
Lu, Rongxing [2 ]
Choo, Kim Kwang Raymond [3 ]
Yin, Fan [1 ]
Tang, Xiaohu [1 ]
机构
[1] Southwest Jiaotong Univ, Informat Secur & Natl Comp Grid Lab, Chengdu 610031, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
芬兰科学院; 加拿大自然科学与工程研究理事会; 美国国家科学基金会;
关键词
Secure data deduplication; big data; brute-force attacks; data availability; accountability;
D O I
10.1109/TBDATA.2017.2721444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure data deduplication can significantly reduce the communication and storage overheads in cloud storage services, and has potential applications in our big data-driven society. Existing data deduplication schemes are generally designed to either resist brute-force attacks or ensure the efficiency and data availability, but not both conditions. We are also not aware of any existing scheme that achieves accountability, in the sense of reducing duplicate information disclosure (e.g., to determine whether plaintexts of two encrypted messages are identical). In this paper, we investigate a three-tier cross-domain architecture, and propose an efficient and privacy-preserving big data deduplication in cloud storage (hereafter referred to as EPCDD). EPCDD achieves both privacy-preserving and data availability, and resists brute-force attacks. In addition, we take accountability into consideration to offer better privacy assurances than existing schemes. We then demonstrate that EPCDD outperforms existing competing schemes, in terms of computation, communication and storage overheads. In addition, the time complexity of duplicate search in EPCDD is logarithmic.
引用
收藏
页码:73 / 84
页数:12
相关论文
共 50 条
  • [21] Privacy-preserving Cross-domain Routing Optimization -A Cryptographic Approach
    Chen, Qingjun
    Qian, Chen
    Zhong, Sheng
    2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2015, : 356 - 365
  • [22] A Study on Privacy-Preserving Transformer Model for Cross-Domain Recommendation
    Ning, Jing
    Li, Kin Fun
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 424 - 435
  • [23] Privacy-preserving Cross-domain Recommendation with Federated Graph Learning
    Tian, Changxin
    Xie, Yuexiang
    Chen, Xu
    Li, Yaliang
    Zhao, Xin
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2024, 42 (05)
  • [24] A cross-domain privacy-preserving protocol for cooperative firewall optimization
    Chen, Fei
    Bruhadeshwar, Bezawada
    Liu, Alex X.
    Proceedings - IEEE INFOCOM, 2011, : 2903 - 2911
  • [25] A Cross-Domain Privacy-Preserving Protocol for Cooperative Firewall Optimization
    Chen, Fei
    Bruhadeshwar, Bezawada
    Liu, Alex X.
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2903 - 2911
  • [26] A Conditional Privacy-Preserving Protocol for Cross-Domain Communications in VANET
    Seifelnasr, Mohamed
    Altawy, Riham
    Youssef, Amr
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025,
  • [27] Privacy-Preserving Data Deduplication on Trusted Processors
    Dang, Hung
    Chang, Ee-Chien
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 66 - 73
  • [28] Efficient Privacy-Preserving Multicast in Cloud Data Centers
    Li, He
    Li, Peng
    Guo, Song
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 810 - 815
  • [29] Load Balancing for Privacy-Preserving Access to Big Data in Cloud
    Li, Peng
    Guo, Song
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 524 - 528
  • [30] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135