Deduplication on encrypted big data in cloud

Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data intr...

Full description

Saved in:
Bibliographic Details
Main Authors: YAN, Zheng, DING, Wenxiu, YU, Xixun, ZHU, Haiqi, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3345
https://ink.library.smu.edu.sg/context/sis_research/article/4347/viewcontent/Deduplication_on_encrypted_big_data_in_cloud.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4347
record_format dspace
spelling sg-smu-ink.sis_research-43472019-04-02T02:53:32Z Deduplication on encrypted big data in cloud YAN, Zheng DING, Wenxiu YU, Xixun ZHU, Haiqi DENG, Robert H., Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in cloud. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. They cannot flexibly support data access control and revocation. Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The results show the superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage. 2016-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3345 info:doi/10.1109/TBDATA.2016.2587659 https://ink.library.smu.edu.sg/context/sis_research/article/4347/viewcontent/Deduplication_on_encrypted_big_data_in_cloud.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University proxy re-encryption Access control big data cloud computing data deduplication Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic proxy re-encryption
Access control
big data
cloud computing
data deduplication
Information Security
spellingShingle proxy re-encryption
Access control
big data
cloud computing
data deduplication
Information Security
YAN, Zheng
DING, Wenxiu
YU, Xixun
ZHU, Haiqi
DENG, Robert H.,
Deduplication on encrypted big data in cloud
description Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in cloud. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. They cannot flexibly support data access control and revocation. Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control. We evaluate its performance based on extensive analysis and computer simulations. The results show the superior efficiency and effectiveness of the scheme for potential practical deployment, especially for big data deduplication in cloud storage.
format text
author YAN, Zheng
DING, Wenxiu
YU, Xixun
ZHU, Haiqi
DENG, Robert H.,
author_facet YAN, Zheng
DING, Wenxiu
YU, Xixun
ZHU, Haiqi
DENG, Robert H.,
author_sort YAN, Zheng
title Deduplication on encrypted big data in cloud
title_short Deduplication on encrypted big data in cloud
title_full Deduplication on encrypted big data in cloud
title_fullStr Deduplication on encrypted big data in cloud
title_full_unstemmed Deduplication on encrypted big data in cloud
title_sort deduplication on encrypted big data in cloud
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/3345
https://ink.library.smu.edu.sg/context/sis_research/article/4347/viewcontent/Deduplication_on_encrypted_big_data_in_cloud.pdf
_version_ 1770573117730586624