IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 2016
DOI: 10.1109/infocom.2016.7524346
|View full text |Cite
|
Sign up to set email alerts
|

Enabling secure and effective near-duplicate detection over encrypted in-network storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 27 publications
(27 citation statements)
references
References 17 publications
0
27
0
Order By: Relevance
“…Near-duplicate detection (NDD) is a general data caching function that can help to reuse near-duplicate data and alleviate network traffic congestion. Cui et al [55], [57] proposed a secure NDD function by resorting to multikey searchable encryption (MKSE) [161] to enable queries on encrypted content uploaded from multiple users under different secret keys. Using MKSE, the service provider can transform the user's query encrypted with her own secret key into the form of different content providers' keys.…”
Section: Fig 5 Architecture Of Blindbox [24] In the Setup Phase The Endpoint Prepares A Garbled Aes Embedded With The Encryption Key On Tmentioning
confidence: 99%
“…Near-duplicate detection (NDD) is a general data caching function that can help to reuse near-duplicate data and alleviate network traffic congestion. Cui et al [55], [57] proposed a secure NDD function by resorting to multikey searchable encryption (MKSE) [161] to enable queries on encrypted content uploaded from multiple users under different secret keys. Using MKSE, the service provider can transform the user's query encrypted with her own secret key into the form of different content providers' keys.…”
Section: Fig 5 Architecture Of Blindbox [24] In the Setup Phase The Endpoint Prepares A Garbled Aes Embedded With The Encryption Key On Tmentioning
confidence: 99%
“…Hand gesture recognition [63] 9. Resource utilization and traffic alleviation in many network architectures and leveraging in-network storage for various content-centric sessions [117] 10. Visual media intelligence in detecting similar visual content published on the web in a short period of time [118] 9 Challenges and Future Research Directions A major challenge for the NDD is the runtime performance.…”
Section: Applications Of Near-duplicate Detection Of Imagesmentioning
confidence: 99%
“…Near-duplicate data scanning for encrypted data has been studied. A lot of wastage in the storage system occurs due to these duplicates which is very costly to afford [9].…”
Section: Literature Reviewmentioning
confidence: 99%