A Video Deduplication Scheme with Privacy Preservation in IoT

被引:1
作者
Li, Xuan [1 ,2 ]
Lin, Jie [1 ,2 ]
Li, Jin [1 ,2 ]
Jin, Biao [1 ,2 ]
机构
[1] Fujian Normal Univ, Sch Software, Fuzhou, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015) | 2016年 / 575卷
关键词
Internet of thing; Cloud storage environment; Data deduplication; Privacy preservation; Cryptosystem; SERVICE;
D O I
10.1007/978-981-10-0356-1_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the Internet of Things (IoT) has received considerable attentions and the overall number of connected devices in IoT is growing at an alarming rate. The end-terminals in IoT usually collect data and transmit them to the data-processing center. However, when the data involve user privacy, the data owners may prefer to encrypt their data for security consideration before transmitting them. This paper proposes a video deduplication scheme with privacy preservation by combining the techniques of data deduplication and cryptography. In the scheme, the data owner divides every frame of video into blocks of the same size. Then the blocks are encrypted and uploaded to the cloud platform. On the server side, identical blocks which have been already stored in the database are eliminated for saving the storage space.
引用
收藏
页码:409 / 417
页数:9
相关论文
共 20 条
  • [11] Litwin W., 2012, WPES P ANN ACM WORKS, P171
  • [12] An Overview of Privacy and Security Issues in the Internet of Things
    Medaglia, Carlo Maria
    Serbanati, Alexandru
    [J]. INTERNET OF THINGS-BOOK, 2010, : 389 - 395
  • [13] A Study of Practical Deduplication
    Meyer, Dutch T.
    Bolosky, William J.
    [J]. ACM TRANSACTIONS ON STORAGE, 2012, 7 (04)
  • [14] Key management systems for sensor networks in the context of the Internet of Things
    Roman, Rodrigo
    Alcaraz, Cristina
    Lopez, Javier
    Sklavos, Nicolas
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 147 - 159
  • [15] Wang C, 2010, INT CON DISTR COMP S, DOI 10.1109/ICDCS.2010.34
  • [16] Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
    Wang, Cong
    Zhang, Bingsheng
    Ren, Kui
    Roveda, Janet M.
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (01) : 166 - 177
  • [17] Wang M, 2012, PROC CVPR IEEE, P3274, DOI 10.1109/CVPR.2012.6248064
  • [18] Internet of Things - New security and privacy challenges
    Weber R.H.
    [J]. Computer Law and Security Review, 2010, 26 (01) : 23 - 30
  • [19] A novel image encryption method based on total shuffling scheme
    Zhang, Guoji
    Liu, Qing
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (12) : 2775 - 2780
  • [20] Zhu B, 2008, PROCEEDINGS OF THE 6TH USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST '08), P269