Journal of Xidian University ›› 2024, Vol. 51 ›› Issue (1): 187-200.doi: 10.19665/j.issn1001-2400.20230205
• Cyberspace Security • Previous Articles Next Articles
HE Xinfeng1,2(), YANG Qinqin1,2()
Received:
2022-10-25
Online:
2024-01-20
Published:
2023-08-30
Contact:
YANG Qinqin
E-mail:popsoda@126.com;yangqinqin202207@163.com
CLC Number:
HE Xinfeng, YANG Qinqin. Deduplication scheme with data popularity for cloud storage[J].Journal of Xidian University, 2024, 51(1): 187-200.
"
webmail 1 | webmail 10 | webmail 16 | ||
---|---|---|---|---|
流行度阈值 | 100 | 100 | 100 | |
流行数据 | 总量 | 129 519 | 12 050 | 142 230 |
副本数量 | 129 110 | 12 022 | 141 738 | |
重复率 | 129 110/129 519 | 12 022/12 050 | 141 738/142 230 | |
非流行数据 | 总量 | 546 619 | 86 139 | 803 281 |
副本数量 | 165 877 | 31 740 | 194 479 | |
重复率 | 165 877/546 619 | 31 740/86 139 | 194 479/803 281 | |
总重复率 | 294 987/676 138 | 43 762/98 189 | 336 217/945 511 |
[1] | IDC CORPORATE.世界的数字化-从边缘到核心(2018)[R/OL].[2022-01-01].https://max.book118.com/html/2019/0325/6020240050002020.shtm. |
[2] | DOUCEUR J R, ADYA A, BOLOSKY W J, et al. Reclaiming Space from Duplicate Files in a Serverless Distributed File System[C]//Proceedings 22nd International Conference on Distributed Computing Systems. Piscataway: IEEE, 2002:617-624. |
[3] | BELLARE M, KEELVEEDHI S, RISTENPART T. Message-Locked Encryption and Secure Deduplication[C]//Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2013:296-312. |
[4] | CHEN R M, MU Y, YANG G M, et al. BL-MLE:Block-Level Message-Locked Encryption for Secure Large File Deduplication[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(12):2643-2652. |
[5] |
LI J, LI Y K, CHEN X F, et al. A Hybrid Cloud Approach for Secure Authorized Deduplication[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(5):1206-1216.
doi: 10.1109/TPDS.2014.2318320 |
[6] | TANG X, ZHOU L N, HUANG Y F, et al, Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption[C]//2018 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering(TrustCom/BigDataSE). Piscataway: IEEE, 2018:897-904. |
[7] |
YUAN H R, CHEN X F, LI J, et al. Secure Cloud Data Deduplication with Efficient Re-Encryption[J]. IEEE Transactions on Services Computing, 2022, 15(1):442-456.
doi: 10.1109/TSC.2019.2948007 |
[8] | 李雪莲, 张夏川, 高军涛, 等. 支持属性和代理重加密的区块链数据共享方案[J]. 西安电子科技大学学报, 2022, 49(1):1-16. |
LI Xuelian, ZHANG Xiachuan, GAO Juntao, et al. Blockchain Data Sharing Scheme Supporting Attribute and Proxy Re-Encryption[J]. Journal of Xidian University, 2022, 49(1):1-16. | |
[9] | STANEK J, SORNIOTTI A, ANDROULAKI E, et al. A Secure Data Deduplication Scheme for Cloud Storage[R]. Berlin:Springer, 2014. |
[10] |
STANEK J, KENCL L. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15(4):694-707.
doi: 10.1109/TDSC.8858 |
[11] | PUZIO P, MOLVA R, ÖNEN M, et al. PerfectDedup:Secure Data Deduplication[C]//Data Privacy Management and Autonomous Spontaneous Security. Berlin: Springer, 2015:150-166. |
[12] |
高文静, 咸鹤群, 田呈亮, 等. 基于双层加密的云存储数据去重方法[J]. 密码学报, 2020, 7(5):698-712.
doi: 10.13868/j.cnki.jcr.000400 |
GAO Wenjing, XIAN Hequn, TIAN Chengliang, et al. A Cloud Storage Deduplication Method Based on Double-Layered Encryption[J]. Journal of Cryptologic Research, 2020, 7(5):698-712. | |
[13] | 高文静, 咸鹤群, 程润辉. 基于双层加密和密钥共享的云数据去重方法[J]. 计算机学报, 2021, 44(11):2203-2215. |
GAO Wenjing, XIANHequn, CHENG Runhui. A Cloud Data Deduplication Method Based on Double-Layered Encryption and Key Sharing[J]. Chinese Journal of Computers, 2021, 44(11):2203-2215. | |
[14] | HA G X, CHEN H, JIA C F, et al. A Secure Deduplication Scheme Based on Data Popularity with Fully Random Tags[C]// 2021 IEEE 20th International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom). Piscataway: IEEE, 2021:207-214. |
[15] |
哈冠雄, 贾巧雯, 陈杭, 等. 无第三方服务器的基于数据流行度的加密去重方案[J]. 通信学报, 2022, 43(8):17-29.
doi: 10.11959/j.issn.1000-436x.2022151 |
HA Guanxiong, JIA Qiaowen, Chen Hang, et al. Data Popularity-Based Encrypted Deduplication Scheme without Third-Party Servers[J]. Journal on Communications, 2022, 43(8):17-29.
doi: 10.11959/j.issn.1000-436x.2022151 |
|
[16] |
HE Y L, XIAN H Q, WANG L M, et al. Secure Encrypted Data Deduplication Based on Data Popularity[J]. Mobile Networks and Applications, 2021, 26(4):1686-1695.
doi: 10.1007/s11036-019-01504-3 |
[17] |
BLOOM B H. Space/Time Trade-offs in Hash Coding with Allowable Errors[J]. Communications of the ACM, 1970, 13(7):422-426.
doi: 10.1145/362686.362692 |
[18] |
FAN L, CAO P, ALMEIDA J, et al. Summary Cache:A Scalable Wide-Area Web Cache Sharing Protocol[J]. IEEE/ACM Transactions on Networking, 2000, 8(3):281-293.
doi: 10.1109/90.851975 |
[19] |
GUO D K, WU J, CHEN HH, et al. The Dynamic Bloom Filters[J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(1):120-133.
doi: 10.1109/TKDE.2009.57 |
[20] | BRUCK J, GAO J, JIANG A X. Weighted Bloom Filter[C]//2006 IEEE International Symposium on Information Theory. Piscataway: IEEE, 2006:2304-2308. |
[21] | YAN X A, SHI W Q, TIAN H. Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter[J]. Journal of Information Processing Systems, 2019, 15(6):1265-1276. |
[22] |
PATGIRI R, NAYAK S, BORGOHAIN S K. PassDB:A Password Database with Strict Privacy Protocol Using 3D Bloom Filter[J]. Information Sciences, 2020, 539:157-176.
doi: 10.1016/j.ins.2020.05.135 |
[23] | CHHABRA N, BALA M. An Optimized Data Duplication Strategy for Cloud Computing:Dedup with ABE and Bloom Filters[J]. International Journal of Future Generation Communication and Networking, 2020, 13(1):824-834. |
[24] | 咸鹤群, 高原, 穆雪莲, 等. 基于阈值动态调整的重复数据删除方案[J]. 软件学报, 2021, 32(11):3563-3575. |
XIAN Hequn, GAO Yuan, MU Xuelian, et al. Deduplication Scheme Based on Threshold Dynamic Adjustment[J]. Journal of Software, 2021, 32(11):3563-3575. | |
[25] | TARASOV V, MUDRANKIT A, BUIK W, et al. Generating Realistic Datasets for Deduplication Analysis[C]//2012 USENIX Annual Technical Conference(USENIX ATC 12). Berkeley: USENIX, 2012:261-272. |
[1] | HA Guanxiong, JIA Qiaowen, CHEN Hang, JIA Chunfu, LIU Lanqing. Encrypted deduplication scheme with access control and key updates [J]. Journal of Xidian University, 2023, 50(6): 195-206. |
[2] | CUI Yuanyou,WANG Xu’an,LANG Xun,TU Zheng,SU Yunxuan. Improved short-signature based cloud data audit scheme [J]. Journal of Xidian University, 2023, 50(5): 132-141. |
[3] | CAI Ying,ZHANG Meng,LI Xin,ZHANG Yu,FAN Yanfang. Anti-collusion attack image retrieval privacy protection scheme for ASPE [J]. Journal of Xidian University, 2023, 50(5): 156-165. |
[4] | CAO Laicheng,WU Wentao,FENG Tao,GUO Xian. Privacy preserving multi-classification LR scheme for data quality [J]. Journal of Xidian University, 2023, 50(5): 188-198. |
[5] | LIN Genghao,ZHOU Ziji,TANG Xin,ZHOU Yiteng,ZHONG Yuqi,QI Tianyang. Random chunks attachment strategy based secure deduplication for cloud data [J]. Journal of Xidian University, 2023, 50(5): 212-228. |
[6] | YANG Haibin,LI Ruifeng,YI Zhengge,NIU Ke,YANG Xiaoyuan. Efficient cloud storage data auditing scheme without bilinear pairing [J]. Journal of Xidian University, 2022, 49(1): 47-54. |
[7] | LI Huadong,ZHANG Xueliang,WANG Xiaolei,LIU Hui,WANG Pengcheng,DU Junzhao. Multi-node cooperative game load balancing strategy in the Kubernetes cluster [J]. Journal of Xidian University, 2021, 48(6): 16-22. |
[8] | WANG Yan. Enhanced multi-objective evolutionary algorithm for workflow scheduling on the cloud platform [J]. Journal of Xidian University, 2019, 46(1): 130-136. |
[9] | REN Jingsi;WANG Jinlin;CHEN Xiao;YE Xiaozhou. Provable multi-copy dynamic data possession in cloud storage [J]. Journal of Xidian University, 2017, 44(6): 156-161+174. |
[10] | HAN Kun;ZHANG Hailin;XIN Dan;WU Bo;KANG Yuanji. Design method of an identity-based fully homomorphic encryption library [J]. Journal of Xidian University, 2017, 44(4): 56-61. |
[11] | JING Weipeng;HUO Shuaiqi;CHEN Guangsheng;LIU Yaqiu. Novel mixed-criticality reliability scheduling strategy and schedulability test [J]. Journal of Xidian University, 2016, 43(6): 158-163. |
[12] | HUANG Chunshui;REN Yanli;CAI Jianxing. Verifiable outsourcing scheme for batch modular exponentiations [J]. Journal of Xidian University, 2016, 43(4): 135-140. |
[13] | JING Weipeng;WU Zhibo;LIU Hongwei;SHU Yanjun. Multiple DAGs dynamic workflow reliability scheduling algorithm in a cloud computing system [J]. Journal of Xidian University, 2016, 43(2): 83-88. |
[14] | LIU Xing;YUAN Chaowei;YANG Zhen;LI Zhenjun. Services promote Lyapunov-based strategy in mobile cloud computing [J]. J4, 2015, 42(6): 138-144. |
[15] | LI Haoxing;LI Fenghua;SONG Chenggen;SU Mang;LIU Xin. Public key encryption with multi-keywords search [J]. J4, 2015, 42(5): 20-25. |
|