2018
DOI: 10.3390/s18061814
|View full text |Cite
|
Sign up to set email alerts
|

Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

Abstract: In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users’ personal information, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
24
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 46 publications
(24 citation statements)
references
References 36 publications
(37 reference statements)
0
24
0
Order By: Relevance
“…For the multiple sources, the authors in [22] proposed a new homomorphic signature scheme based on network coding and applied it to IoT. The privacy is preserved in IoT using centralized duplicate removal video storage system [23]. Also, a new identity-based antiquantum blind authentication for privacy preserving in wireless sensor networks has been proposed in [24].…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…For the multiple sources, the authors in [22] proposed a new homomorphic signature scheme based on network coding and applied it to IoT. The privacy is preserved in IoT using centralized duplicate removal video storage system [23]. Also, a new identity-based antiquantum blind authentication for privacy preserving in wireless sensor networks has been proposed in [24].…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…Cloud-assisted eHealth systems provide users including individuals and medical institutions an efficient and flexible way to manage their EHRs. Since EHRs are most personal and sensitive information for patients [18], cloud-assisted eHealth systems also suffer from challenging privacy and security threats toward outsourced EHRs [17,41,20,37,14].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, the security and privacy issues for Internet of Things have attracted a lot of research interests [5][6][7][8][9][10]. In particular, the analysis of applications and protocols in real-time network traffic monitoring is a fundamental and critical building block in network management and security systems for IoT infrastructures [11][12][13][14][15].…”
Section: Related Workmentioning
confidence: 99%