A Video Deduplication Scheme with Privacy Preservation in IoT

被引:1
作者
Li, Xuan [1 ,2 ]
Lin, Jie [1 ,2 ]
Li, Jin [1 ,2 ]
Jin, Biao [1 ,2 ]
机构
[1] Fujian Normal Univ, Sch Software, Fuzhou, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015) | 2016年 / 575卷
关键词
Internet of thing; Cloud storage environment; Data deduplication; Privacy preservation; Cryptosystem; SERVICE;
D O I
10.1007/978-981-10-0356-1_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the Internet of Things (IoT) has received considerable attentions and the overall number of connected devices in IoT is growing at an alarming rate. The end-terminals in IoT usually collect data and transmit them to the data-processing center. However, when the data involve user privacy, the data owners may prefer to encrypt their data for security consideration before transmitting them. This paper proposes a video deduplication scheme with privacy preservation by combining the techniques of data deduplication and cryptography. In the scheme, the data owner divides every frame of video into blocks of the same size. Then the blocks are encrypted and uploaded to the cloud platform. On the server side, identical blocks which have been already stored in the database are eliminated for saving the storage space.
引用
收藏
页码:409 / 417
页数:9
相关论文
共 20 条
  • [1] [Anonymous], 2014, P 6 INT C NEW TECHNO
  • [2] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [3] Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    Ristenpart, Thomas
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
  • [4] A High-precision Duplicate Image Deduplication Approach
    Chen, Ming
    Wang, Shupeng
    Tian, Liang
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (11) : 2768 - 2775
  • [5] Reclaiming space from duplicate files in a serverless distributed file system
    Douceur, JR
    Adya, A
    Bolosky, WJ
    Simon, D
    Theimer, M
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 617 - 624
  • [6] Side Channels in Cloud Services Deduplication in Cloud Storage
    Harnik, Danny
    Pinkas, Benny
    Shulman-Peleg, Alexandra
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (06) : 40 - 47
  • [7] Katiyar Atul, 2011, P 3 USENIX C HOT TOP, P7
  • [8] Context-aware service utilisation in the clouds and energy conservation
    Kiani, Saad Liaquat
    Anjum, Ashiq
    Antonopoulos, Nick
    Knappmeyer, Michael
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (01) : 111 - 131
  • [9] Secure Deduplication with Efficient and Reliable Convergent Key Management
    Li, Jin
    Chen, Xiaofeng
    Li, Mingqiang
    Li, Jingwei
    Lee, Patrick P. C.
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (06) : 1615 - 1625
  • [10] Li X., 2014, J AMB INTEL HUM COMP, V6, P563