期刊
PERVASIVE AND MOBILE COMPUTING
卷 41, 期 -, 页码 231-242出版社
ELSEVIER
DOI: 10.1016/j.pmcj.2017.03.010
关键词
Secure deduplication; Ubiquitous city; Content-defined chunking; Proofs of ownership
资金
- National Natural Science Foundation of China [61572382]
- China 111 Project [B16037]
- National High Technology Research and Development Program (863 Program) of China [2015AA016007]
- Natural Science Basic Research Plan in Shaanxi Province of China [2016JZ021]
- Guangxi Cooperative Innovation Center of cloud computing and Big Data [YD16506]
- Guangxi Colleges and Universities Key Laboratory of cloud computing and complex systems [YF16101]
- CICAEET fund
- PAPD fund
Ubiquitous city, a wonderful vision of future urban, enables citizens to access to any infrastructure and enjoy high quality urban services by integrating information and communication technologies into urban management. However, it inevitably brings a huge amount of data in the Ubiquitous city scenario. It makes how to efficiently manage the everincreasing datum while preserving data privacy a challenge task. To cope with the above issue, secure data deduplication has attracted considerable interests both academic and industrial community. It can reduce the amount of storage cost by eliminating duplicate data copies, while providing data privacy. Although message-locked encryption has been widely adopted to perform secure cross-client deduplication, it will bring many additional metadata located both client and cloud sides. Recently, some researchers proposed a novel extension of message-locked encryption, named block-level message-locked encryption (BL-MLE), in which block keys are encapsulated into block tags to save metadata storage space. We argue that BL-MLE suffers from high computation overhead for block tag comparison, especially in dissimilar files setting. In this paper, we propose a novel secure similarity-based data deduplication scheme by integrating the technologies of bloom filter and content-defined chunking, which can significantly reduce the computation overhead by only performing deduplication operations for similar files. Security and efficiency evaluations show that the proposed scheme can achieve the desired security goals, while providing a comparable computation overhead. (C) 2017 Elsevier B.V. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据