2019
DOI: 10.1109/tii.2019.2920402
|View full text |Cite
|
Sign up to set email alerts
|

Game Theoretical Analysis on Encrypted Cloud Data Deduplication

Abstract: Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice depends on whether all system players or stakeholders are willing to accept and execute them in a cooperative way, which was scarcely investigated in the previous literature. In this paper, we employ a non-cooperative game to model the interactions in a c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…In this case, confirming deduplication happened already at the CSP to get an offer of low storage charge becomes essential, our paper aims to solve this issue. For motivating the adoption of our scheme, in another line of our work, we study how to make all related stakeholders to accept and use deduplication schemes by applying game theory to design proper incentive or punishment mechanisms in three cases: client-controlled deduplication [35], [36], server-controlled deduplication [12] and hybrid deduplication [13]. Since our scheme design is built upon the one in [14], belonging to server-controlled deduplication, the incentive mechanism [12] suitable for the server-controlled deduplication schemes can be applied to motivate scheme adoption.…”
Section: Further Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, confirming deduplication happened already at the CSP to get an offer of low storage charge becomes essential, our paper aims to solve this issue. For motivating the adoption of our scheme, in another line of our work, we study how to make all related stakeholders to accept and use deduplication schemes by applying game theory to design proper incentive or punishment mechanisms in three cases: client-controlled deduplication [35], [36], server-controlled deduplication [12] and hybrid deduplication [13]. Since our scheme design is built upon the one in [14], belonging to server-controlled deduplication, the incentive mechanism [12] suitable for the server-controlled deduplication schemes can be applied to motivate scheme adoption.…”
Section: Further Discussionmentioning
confidence: 99%
“…Another security issue ignored by the previous literature is the correctness guarantee of data duplication check provided by the CSP. Several schemes [12], [13] motivate the CSP to perform deduplication, but ignore that the CSP could cheat the users by providing a fake duplication check result. The reason is simple since the CSP can gain an extra profit by asking the users to pay normal storage fee without granting a deserved discount while performing deduplication to save storage space.…”
Section: Introductionmentioning
confidence: 99%
“…In order to deal with the threat of privacy disclosure, more and more cloud applications need encryption technology [6] to protect sensitive data in all aspects of transmission, storage, and computing. Combined with the actual needs of cloud space environment, how to make more effective use of ciphertext data has become a research hot spot in the field of network security in recent years [7][8][9].…”
Section: Introductionmentioning
confidence: 99%