Similarity-Based Secure Deduplication for IIoT Cloud Management System

被引:1
作者
Gao, Yuan [1 ]
Chen, Liquan [1 ,2 ]
Han, Jinguang [1 ]
Yu, Shui [3 ]
Fang, Huiyu [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Purple Mt Labs Network & Commun Secur, Nanjing 211111, Peoples R China
[3] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Cloud computing; Encryption; Security; Costs; Memory; Bandwidth; Data similarity comparison; deduplication; edge computing; industrial Internet of Things; proofs of ownership; SCHEME;
D O I
10.1109/TDSC.2023.3302891
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the Industrial Internet of Things (IIoT), the scale of IIoT data is rapidly increasing, bringing significant challenges to existing data management systems. To tackle this issue, we propose a similarity-based secure deduplication for IIoT cloud management system, which can effectively balance the security and availability of IIoT data and minimize the storage cost. Concretely, we propose a similarity-based secure deduplication algorithm for IIoT (IIoT-SBSD) by designing a similarity-preserving tag (IIoT-Simhash). This algorithm can perform similarity deduplication over ciphertexts, thus reducing storage space while ensuring data security. Besides, we construct a parallelizable edge-based deduplication framework in which similarity comparison and deduplication operations are performed directly by edge nodes, significantly alleviating the transmission pressure. Additionally, we propose similarity-based proofs of ownership, S-PoWs, to mitigate the impact of data deduplication on the user's access to the IIoT data. Experimental results show that our method significantly reduces storage space and transmission bandwidth without increasing the computation burden.
引用
收藏
页码:2242 / 2256
页数:15
相关论文
共 43 条
  • [21] Sood S., 2011, CIKM, P1117
  • [22] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [23] Sudharsan B, 2021, 2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), P680, DOI [10.1109/PerComWorkshops51409.2021.9431086, 10.1109/PERCOMWORKSHOPS51409.2021.9431086]
  • [24] Generalized Deduplication: Lossless Compression by Clustering Similar Data
    Talasila, Prasad
    Lucani, Daniel E.
    [J]. PROCEEDING OF THE 2019 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2019,
  • [25] Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage
    Tian, Guohua
    Hu, Yunhan
    Wei, Jianghong
    Liu, Zheli
    Huang, Xinyi
    Chen, Xiaofeng
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3941 - 3954
  • [26] Trautman L. J., 2022, The Internet of Things (IoT) in a post-pandemic world
  • [27] Big data security challenges and strategies
    Venkatraman, Sitalakshmi
    Venkatraman, Ramanathan
    [J]. AIMS MATHEMATICS, 2019, 4 (03): : 860 - 879
  • [28] Vijayakumar R., 2020, J. Innov. Image Process, P102
  • [29] Vijayalakshmi K., 2021, Proceedings of International Conference on Intelligent Computing, Information and Control Systems. (ICICCS 2020). Advances in Intelligent Systems and Computing (AISC 1272), P397, DOI 10.1007/978-981-15-8443-5_33
  • [30] Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems
    Wang, Chen
    Zhou, Tianqi
    Shen, Jian
    Wang, Weizheng
    Zhou, Xiaokang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 140 : 129 - 137