Deduplication on encrypted big data in cloud
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data intr...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3345 https://ink.library.smu.edu.sg/context/sis_research/article/4347/viewcontent/Deduplication_on_encrypted_big_data_in_cloud.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4347 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-43472019-04-02T02:53:32Z Deduplication on encrypted big data in cloud YAN, Zheng DING, Wenxiu YU, Xixun ZHU, Haiqi DENG, Robert H., Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in cloud. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. They cannot flexibly support data access control and revocation. Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The results show the superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage. 2016-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3345 info:doi/10.1109/TBDATA.2016.2587659 https://ink.library.smu.edu.sg/context/sis_research/article/4347/viewcontent/Deduplication_on_encrypted_big_data_in_cloud.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University proxy re-encryption Access control big data cloud computing data deduplication Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
proxy re-encryption Access control big data cloud computing data deduplication Information Security |
spellingShingle |
proxy re-encryption Access control big data cloud computing data deduplication Information Security YAN, Zheng DING, Wenxiu YU, Xixun ZHU, Haiqi DENG, Robert H., Deduplication on encrypted big data in cloud |
description |
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in cloud. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. They cannot flexibly support data access control and revocation. Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The results show the superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage. |
format |
text |
author |
YAN, Zheng DING, Wenxiu YU, Xixun ZHU, Haiqi DENG, Robert H., |
author_facet |
YAN, Zheng DING, Wenxiu YU, Xixun ZHU, Haiqi DENG, Robert H., |
author_sort |
YAN, Zheng |
title |
Deduplication on encrypted big data in cloud |
title_short |
Deduplication on encrypted big data in cloud |
title_full |
Deduplication on encrypted big data in cloud |
title_fullStr |
Deduplication on encrypted big data in cloud |
title_full_unstemmed |
Deduplication on encrypted big data in cloud |
title_sort |
deduplication on encrypted big data in cloud |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/3345 https://ink.library.smu.edu.sg/context/sis_research/article/4347/viewcontent/Deduplication_on_encrypted_big_data_in_cloud.pdf |
_version_ |
1770573117730586624 |