A Study on Light-Weight and Efficient Proof of Ownership in Client-Side Deduplication Environment

被引:0
|
作者
Kim, Won-Bin [1 ]
Lee, Im-Yeong [1 ]
机构
[1] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan 39538, South Korea
基金
新加坡国家研究基金会;
关键词
Deduplication; Cloud Storage; Proof of Ownership; Convergent Encryption;
D O I
10.1166/asl.2017.10463
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Deduplication technology is used to improve the efficiency of data storage space. It involves the prevention of duplicate storing of data by comparing the stored data with the data to be uploaded. However, several security threats arise from this process. Various techniques were proposed to solve this problem by generating a number of operations and communications. This created large loads and reduced the efficacy of deduplication. In this study, we propose a technology that provides better operating efficiency while maintaining the same level of security in order to improve the inefficiency of the conventional method.
引用
收藏
页码:10409 / 10413
页数:5
相关论文
共 50 条
  • [41] Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
    Marchal, Samuel
    Armano, Giovanni
    Grondahl, Tommi
    Saari, Kalle
    Singh, Nidhi
    Asokan, N.
    IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (10) : 1717 - 1733
  • [42] A framework for efficient and anonymous Web usage mining based on client-side tracking
    Shahabi, C
    Banaei-Kashani, F
    WEBKDD 2001 - MINING WEB LOG DATA ACROSS ALL CUSTOMERS TOUCH POINTS, 2002, 2356 : 113 - 144
  • [43] FITS - A light-weight integrated programming environment
    Chapman, B
    Bodin, F
    Hill, L
    Merlin, J
    Viland, G
    Wollenweber, F
    EURO-PAR'99: PARALLEL PROCESSING, 1999, 1685 : 125 - 134
  • [44] An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
    Zhou Y.
    Yu Z.
    Gu L.
    Feng D.
    BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 2022, 2 (02):
  • [45] R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity
    Guo, Cheng
    Jiang, Xueru
    Choo, Kim-Kwang Raymond
    Jie, Yingmo
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 162
  • [46] Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web
    Chen, Ping
    Desmet, Lieven
    Huygens, Christophe
    Joosen, Wouter
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, : 457 - 462
  • [47] Light-weight IP multimedia subsystem (IMS) client for mobile devices
    Masonta, Moshe Timothy
    Girod-Genet, Marc
    Oyedapo, Olufemi James
    Chatelain, Damien
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 431 - +
  • [48] Acceleration of Server-side Image Processing by Client-side Pre-processing in Web Application Environment
    Juranek, Lubos
    Stastny, Jiri
    Skorpil, Vladislav
    Junek, Lukas
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 127 - 130
  • [49] A Light-weight Software Environment for Confining Android Malware
    Li, Xiaolei
    Bai, Guangdong
    Thian, Benjamin
    Liang, Zhenkai
    Yin, Heng
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 158 - 167
  • [50] Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study
    Chen, Qi Alfred
    Thomas, Matthew
    Osterweil, Eric
    Cao, Yulong
    You, Jie
    Mao, Z. Morley
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 941 - 956