Privacy-Enhanced Deduplication Technique in Closed Circuit Television Video Cloud Service Environment
Keywords:CIosed Circuit Tele Vision Video, Deduplication Technique, Security Framework, CCTV, Video Security
Background/Objectives: With the recent surging popularity of cloud services, various cloud service providers (CSP) are coming into the picture. On cloud platforms, many different forms of services are available, among which storage-based solutions are the most commonly adopted. The cloud storage market also is likely to continue to expand in the future.
Methods/Statistical analysis:Presently, quite a few cloud storage environments are already implementing the deduplication technique. Given the characteristics of cloud environments, storage servers capable of accommodating large quantities of storage are necessary. With increases in storage capacity emerges the need for additional storage solutions. Utilizing deduplication can solve the cost problem fundamentally.
Findings:The privacy problem can be extremely serious if the files in question deal with â€œsensitiveâ€ issues such as political orientation, ideas, particular diseases, and sexuality. When the list of the file uploaders is obtained on the cloud server, the cloud environment itself may act as a surveillance system in the future, hence the unavoidable risk.
Improvements/Applications:This paper indicates the privacy breach problem and proposes a new technique of deduplication to solve it. In the proposed technique, the map structures of the user and files are not stored on the server and thus the list of file uploaders cannot be secured through the analysis of meta-information on the server, hence the privacy of the users intact. Furthermore, the new technique can solve the issue of file ownership by using PIN (Personal Identification Number) and offers merits such as safety against insider breaches and sniffing attacks.
 J. R. Douceur, A Adya, W. J. Bolosky, P. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system", Distributed Computing Systems, Proceedings of 22nd International Conference on. IEEE, 14 pages, Jul. 2002.
 Namje Park and Namhi Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", Sensors, Vol. 16, No. 1, pp. 1-16, Dec. 2015.
 Donghyeok Lee and Namje Park, "Geocasting- based synchronization of Almanac on the maritime cloud for distributed smart surveillance", The Journal of Supercomputing, Vol. 73, No. 3, pp. 1103-1118, Mar. 2017.
 Kyungsu Park, Ji Eun Eom, Jeongsu Park, and Dong Hoon Lee, "Secure and Efficient Client-side Deduplication for Cloud Storage", Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No. 1, pp. 83-94, Feb. 2015.
 Bellare, Mihir, Sriram Keelveedhi, and Thomas Ristenpart, "DupLESS: Server-Aided Encryption for Deduplicated Storage", IACR Cryptology ePrint Archive, 2013.
 Donghyeok Lee and Namje Park, "Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism", Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 3, pp. 787-797, Jun. 2016.
 Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment", Advanced Web and Network Technologies, and Applications, LNCS, Vol. 3842, pp. 741-748, Jan. 2006.
 Hyun-il Kim, Cheolhee Park, Dowon Hong, and Changho Seo, "Encrypted Data Deduplication Using Key Issuing Server", Korea Information Science Society, Vol. 43, No. 2, pp. 143-151, Feb. 2016.
 Cheolhee Park, Dowon Hong, Changho Seo, and Ku-Young Chang, "Privacy Preserving Source Based Deduplication In Cloud Storage", Korea Institute Of Information Security And Cryptology, Vol. 25, No. 1, pp. 123-132, Feb. 2015.
 J. Li, X. Chen, M., Li, J. Li, P. P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management", IEEE transactions on parallel and distributed systems, Vol. 25, No. 6, pp. 1615-1625, Jun. 2014.
 Namje Park and Hyo-Chan Bang, "Mobile middleware platform for secure vessel traffic system in IoT service environment", Security and Communication Networks, John Wiley&Sons Ltd, Vol. 9, No. 6, pp. 500-512, Apr. 2016.
 Bellare, Mihir, Sriram Keelveedhi, and Thomas Ristenpart, "Message-locked encryption and secure deduplication", Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, 2013.
 Namje Park, Hongxin Hu, and Qun Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)", International Journal of Distributed Sensor Networks, Vol. 2016, Article ID 2965438, 3 pages, 2016.
 Cheolhee Park, Dowon Hong, and Changho Seo, "A Secure and Practical Encrypted Data De-duplication with Proof of Ownership in Cloud Storage", Korea Information Science Society, Vol. 43, No. 10, pp. 1165-1172, Oct. 2016.
 Namje Park, "UHF/HF Dual-Band Integrated Mobile RFID/NFC Linkage Method for Mobile Device-based Business Application", The Journal of The Korean Institute of Communication Sciences, Vol. 38, No. 10, pp. 841-851, Oct. 2013.
 Namje Park, "Design and Implementation of Mobile VTS Middleware for Efficient IVEF Service", Journal of KICS, Vol. 39C, No. 6, pp. 466-475, Jun. 2014.
 Kaaniche, Nesrine, and Maryline Laurent, "A secure client side deduplication scheme in cloud storage environments", New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. IEEE, pp.1-7, Mar. 2014.
 P. Puzio, R. Molva, M. Onen, and S. Loureiro, "ClouDedup: secure deduplication with encrypted data for cloud storage", Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on. Vol. 1. IEEE, pp. 363-370, Dec. 2013.
 Namje Park, Jungsoo Park, and Hyoungjun Kim, "Inter-Authentication and Session Key Sharing Procedure for Secure M2M/IoT Environment", International Information Institute(Tokyo) Informa- tion, Vol. 18, No. 1, pp. 261-266, Jan. 2015.
 Donghyeok Lee and Namje Park, "A Secure Almanac Synchronization Method for Open IoT Maritime Cloud Environment", Journal of Korean Institute of Information Technology Vol. 15, No. 2, pp. 79-90, Feb. 2017.
 Ma, Jingwei, Gang Wang, and Xiaoguang Liu., "DedupeSwift: Object-Oriented Storage System Based on Data Deduplication", Trustcom/Big Data SE/I SPA, 2016 IEEE, pp.1069-1076, Aug. 2016.
 Tang, Yang, and Junfeng Yang, "Secure Deduplication of General Computations", USENIX Annual Technical Conference, pp.319-331, Jul. 2015
 Young-Jun Yoo, Sun-Jeong Kim, and Young Woong Ko, "Cloud File Synchronization Scheme using Bidirectional Data Deduplication", Journal of KIIT, Vol. 12, No. 1, pp. 103-110, Jan. 2014.
 Byung Kwan Kim, Young Woong Ko, and Kwang Mo Lee, "Performance Enhancement for Data Deduplication Server Using Bloom Filter", Journal of KIIT. Vol. 12, No. 4, pp. 129-136, Apr. 2014.
 Donghyeok Lee and Namje Park, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment", Personal and Ubiquitous Computing, Vol. 22, No. 1, pp. 3-10, Feb. 2017.
 Donghyeok Lee, Namje Park, Geonwoo Kim, and Seunghun Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment", Peer-to-Peer Networking and Applications, DOI 10.1007/s12083-018-0637-1, pp. 1-10, Mar. 2018.
 Namje Park, "The Core Competencies of SEL-based Innovative Creativity Education", International Journal of Pure and Applied Mathematics, Vol. 118, No. 19, pp. 837-849, Jan. 2018.
 Namje Park, "STEAM Education Program : Training Program for Financial Engineering Career", International Journal of Pure and Applied Mathematics, Vol. 118, No. 19, pp. 819-835, Jan. 2018.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).