A Video Deduplication Scheme with Privacy Preservation in IoT

In recent years, the Internet of Things (IoT) has received considerable attentions and the overall number of connected devices in IoT is growing at an alarming rate. The end-terminals in IoT usually collect data and transmit them to the data-processing ce

  • PDF / 1,567,180 Bytes
  • 9 Pages / 439.37 x 666.142 pts Page_size
  • 13 Downloads / 163 Views

DOWNLOAD

REPORT


School of Software, Fujian Normal University, Fuzhou, China {jessieli24,jinbiao}@fjnu.edu.cn, [email protected], [email protected] 2 School of Computer Science, Guangzhou University, Guangzhou, China

Abstract. In recent years, the Internet of Things (IoT) has received considerable attentions and the overall number of connected devices in IoT is growing at an alarming rate. The end-terminals in IoT usually collect data and transmit them to the data-processing center. However, when the data involve user privacy, the data owners may prefer to encrypt their data for security consideration before transmitting them. This paper proposes a video deduplication scheme with privacy preservation by combining the techniques of data deduplication and cryptography. In the scheme, the data owner divides every frame of video into blocks of the same size. Then the blocks are encrypted and uploaded to the cloud platform. On the server side, identical blocks which have been already stored in the database are eliminated for saving the storage space. Keywords: Internet of thing · Cloud storage environment · Data deduplication · Privacy preservation · Cryptosystem

1

Introduction

In the last few years, the concept of connecting things, which is called The Internet of Things, has drawn a lot of attention from many researchers [1,14]. The idea behind the IoT concept is to include objects in the IT data flows and enable them to interact with other objects. The connected and interacted smart objects in IoT include mobile devices, wearable sensor devices and environmental sensors.By integrating wireless sensors in common scenarios, the object can project a digital snapshot of its state, activity and the surroundings. Then the digital information will be collected and communicated among the interconnected objects or provided to the users locally and remotely. As IoT has received considerable attention in recent years, the overall number of connected devices such as wearable sensor and mobile devices is growing at a very fast rate. However, the capabilities of storage and computation in most of the IoT terminals are extremely limited. Consider that the cloud platform is resource-abundant and capable of finishing designated tasks [8,11,15], the terminals can exploit the storage and computational power of the cloud to relieve from storing and processing the data. c Springer Science+Business Media Singapore 2016  K. Li et al. (Eds.): ISICA 2015, CCIS 575, pp. 409–417, 2016. DOI: 10.1007/978-981-10-0356-1 43

410

X. Li et al.

Nevertheless, the technologies of IoT which introduce a new kind of automation and remote interaction have to face many security risks [12,18]. For example, during the transmission of sensor data from the peripheral part to the central structure, the data may be intercepted by third parties. In fact, the protection of privacy has already become one of the most important concerns when people consider exploring the technology of Internet [2,16]. A good solution for this problem should allow the users in control of their own