Game Theoretical Analysis on Encrypted Cloud Data Deduplication

被引:10
|
作者
Liang, Xueqin [1 ,2 ]
Yan, Zheng [1 ,2 ]
Chen, Xiaofeng [3 ]
Yang, Laurence T. [4 ]
Lou, Wenjing [5 ]
Hou, Y. Thomas [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[3] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Shaanxi, Peoples R China
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
[5] Virginia Polytech Inst & State Univ, Dept Comp Sci, Blacksburg, VA 24061 USA
[6] Virginia Polytech Inst & State Univ, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
基金
中国博士后科学基金; 芬兰科学院;
关键词
Cloud computing; Cryptography; Game theory; Economics; Stakeholders; Memory; Games; encrypted data deduplication; game theory; incentive compatibility; incentive mechanism; PRIVACY;
D O I
10.1109/TII.2019.2920402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice depends on whether all system players or stakeholders are willing to accept and execute them in a cooperative way, which was scarcely investigated in the previous literature. In this paper, we employ a noncooperative game to model the interactions in a client-side server-controlled deduplication scheme (S-DEDU) and construct an incentive mechanism based on payment discount to motivate its final acceptance. The experimental results based on a real-world dataset demonstrate the individual rationality, incentive compatibility, profitability, and robustness of our incentive mechanism.
引用
收藏
页码:5778 / 5789
页数:12
相关论文
共 50 条
  • [1] Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory
    Liang, Xueqin
    Yan, Zheng
    Deng, Robert H.
    Zheng, Qinghua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 587 - 600
  • [2] Encrypted Data Deduplication in Cloud Storage
    Fan, Chun-I
    Huang, Shi-Yuan
    Hsu, Wen-Che
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 18 - 25
  • [3] Deduplication on Encrypted Big Data in Cloud
    Yan, Zheng
    Ding, Wenxiu
    Yu, Xixun
    Zhu, Haiqi
    Deng, Robert H.
    IEEE Transactions on Big Data, 2016, 2 (02): : 138 - 150
  • [4] DEDUP: Deduplication system for Encrypted Data in Cloud
    Kamboj, Himshai
    Sinha, Bharati
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 795 - 800
  • [5] Secure Encrypted Data With Authorized Deduplication in Cloud
    Xiong, Jinbo
    Zhang, Yuanyuan
    Tang, Shaohua
    Liu, Ximeng
    Yao, Zhiqiang
    IEEE ACCESS, 2019, 7 : 75090 - 75104
  • [6] Encrypted Data Management with Deduplication in Cloud Computing
    Yan, Zheng
    Wang, Mingjun
    Li, Yuxiang
    Vasilakos, Athanasios V.
    IEEE CLOUD COMPUTING, 2016, 3 (02): : 28 - 35
  • [7] Secure Cloud Encrypted Data Deduplication Method
    Zhang S.-G.
    Xian H.-Q.
    Wang L.-M.
    Liu H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (12): : 3815 - 3828
  • [8] Game theoretical study on client-controlled cloud data deduplication
    Liang, Xueqin
    Yan, Zheng
    Deng, Robert H.
    COMPUTERS & SECURITY, 2020, 91
  • [9] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [10] Survey on techniques for Authorized Deduplication of Encrypted data in Cloud
    Waghmare, Milind B.
    Padwekar, Suhasini, V
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 553 - +