2020
DOI: 10.1177/1550147720911003
|View full text |Cite
|
Sign up to set email alerts
|

Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment

Abstract: Large amount of data are being produce by Internet-of-things sensor networks and applications. Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications. In order to ensure data security for deduplication, different data should be assigned with different privacy levels. We propose a deduplication scheme based on threshold dynamic adjustment to ensure the security of data uploading and related operations. The concept of the ideal thr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…High deduplication efficiency, high read throughput and high backup throughput achieved by doing the experiments on the real world VM image snapshots of the users. In [29], a secure and efficient data deduplication technique for storing the data received from IoT sensors in the cloud. SecDedoop [30] in which a secure deduplication mechanism used for access control of bigdata over Hadoop Distributed File System.…”
Section: Related Workmentioning
confidence: 99%
“…High deduplication efficiency, high read throughput and high backup throughput achieved by doing the experiments on the real world VM image snapshots of the users. In [29], a secure and efficient data deduplication technique for storing the data received from IoT sensors in the cloud. SecDedoop [30] in which a secure deduplication mechanism used for access control of bigdata over Hadoop Distributed File System.…”
Section: Related Workmentioning
confidence: 99%
“…At the present, the strategy of deletion can primarily be used at the file, block, and byte levels, and they can be optimized for storage space. As shown in Figure 3, the de-duplication levels can be divided into three levels: based on file, block and byte [23] [24].…”
Section: Research Articlementioning
confidence: 99%
“…It provisions both file level and block level data de-duplication This scheme achieves consistency and provides mutual agreement with dynamic ownership management Gao et. al [19] De-duplication scheme based on threshold dynamic adjustment This scheme determines the sensitivity of various data with privacy score during uploading of data into the storage system This scheme supports de-duplication with lower privacy and not for higher extent. Sharma et.…”
Section: Jiang Et Al [18]mentioning
confidence: 99%
“…The main task to be performed in de-duplication is partitioning of data [11], [18], [22]. As deduplication is carried out with protective data various security measures are considered [10], [12][13][14][15], [19]. While decrypting the data for the deduplication process many attackers may intrude to steal the data which is addressed with various potentials in [16], [17].…”
Section: Jiang Et Al [18]mentioning
confidence: 99%