Skip to main content

2018 | OriginalPaper | Buchkapitel

10. Deduplication Practices for Multimedia Data in the Cloud

verfasst von : Fatema Rashid, Ali Miri

Erschienen in: Guide to Big Data Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data deduplication has been a promising and effective technology that provides storage saving in data centers and clouds. It is the process of identifying the redundancy in data, removing all but one copy (or n copies) of duplicate data, and making all references point to that copy. Existing techniques often require access to the content of data in order to establish redundancy. As more sensitive information is stored on clouds, encryption is commonly used to protect this information, which obscures the content of the data to Cloud Service Providers (CSPs). This chapter deals with how to provide deduplication services, while protecting data privacy. Most of the data stored today is multimedia content, with one estimate putting this type of content at about 80% of all corporate and public unstructured big data (Venter and Stein, Images & videos: really big data. http://analytics-magazine.org/images-a-videos-really-big-data/. Accessed 24 August 2016, 2012). In this chapter, we will give an overview of some of the best practices to achieve efficient deduplication for multimedia content.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Cheng, H., & Li, X. (2000). Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8), 2439–2451.CrossRef Cheng, H., & Li, X. (2000). Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8), 2439–2451.CrossRef
Zurück zum Zitat Rashid, F., Miri, A., & Woungang, I. (2014). Proof of retrieval and ownership protocols for images through SPIHT compression. In Proceedings of The 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS’14). New York: IEEE. Rashid, F., Miri, A., & Woungang, I. (2014). Proof of retrieval and ownership protocols for images through SPIHT compression. In Proceedings of The 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS’14). New York: IEEE.
Zurück zum Zitat Rashid, F., Miri, A., & Woungang, I. (March 2015). A secure video deduplication in cloud storage environments using h.264 compression. In Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications San Francisco Bay, USA. New York, IEEE. Rashid, F., Miri, A., & Woungang, I. (March 2015). A secure video deduplication in cloud storage environments using h.264 compression. In Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications San Francisco Bay, USA. New York, IEEE.
Zurück zum Zitat Richardson, I. E. (2011). The H. 264 advanced video compression standard. New York: Wiley. Richardson, I. E. (2011). The H. 264 advanced video compression standard. New York: Wiley.
Zurück zum Zitat Saadi, K., Bouridane, A., & Guessoum, A. (2009). Combined fragile watermark and digital signature for H. 264/AVC video authentication. In Proceedings of The 17th European signal Processing Conference (EUSIPCO 2009). Saadi, K., Bouridane, A., & Guessoum, A. (2009). Combined fragile watermark and digital signature for H. 264/AVC video authentication. In Proceedings of The 17th European signal Processing Conference (EUSIPCO 2009).
Zurück zum Zitat Said, A., & Pearlman, W. A. (1996). A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology, 6(3), 243–250.CrossRef Said, A., & Pearlman, W. A. (1996). A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology, 6(3), 243–250.CrossRef
Zurück zum Zitat Shapiro, J. M. (1993). Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 41(12), 3445–3462.CrossRefMATH Shapiro, J. M. (1993). Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 41(12), 3445–3462.CrossRefMATH
Zurück zum Zitat Singh, P., & Singh, P. (2011). Design and implementation of EZW and SPIHT image coder for virtual images. International Journal of Computer Science and Security (IJCSS), 5(5), 433. Singh, P., & Singh, P. (2011). Design and implementation of EZW and SPIHT image coder for virtual images. International Journal of Computer Science and Security (IJCSS), 5(5), 433.
Zurück zum Zitat Stutz, T., & Uhl, A. (2012). A survey of H. 264 AVC/SVC encryption. IEEE Transactions on Circuits and Systems for Video Technology, 22(3), 325–339.CrossRef Stutz, T., & Uhl, A. (2012). A survey of H. 264 AVC/SVC encryption. IEEE Transactions on Circuits and Systems for Video Technology, 22(3), 325–339.CrossRef
Zurück zum Zitat Thomas, N. M., Lefol, D., Bull, D. R., & Redmill, D. (2007). A novel secure H. 264 transcoder using selective encryption. In Proceedings of The IEEE International Conference on Image Processing (ICIP 2007) (Vol. 4, pp. 85–88). New York: IEEE. Thomas, N. M., Lefol, D., Bull, D. R., & Redmill, D. (2007). A novel secure H. 264 transcoder using selective encryption. In Proceedings of The IEEE International Conference on Image Processing (ICIP 2007) (Vol. 4, pp. 85–88). New York: IEEE.
Zurück zum Zitat Thwel, T. T., & Thein, N. L. (December 2009). An efficient indexing mechanism for data deduplication. In Proceedings of The 2009 International Conference on the Current Trends in Information Technology (CTIT) (pp. 1–5). Thwel, T. T., & Thein, N. L. (December 2009). An efficient indexing mechanism for data deduplication. In Proceedings of The 2009 International Conference on the Current Trends in Information Technology (CTIT) (pp. 1–5).
Zurück zum Zitat Wang, C., Qin, Z. g., & Peng, J., & Wang, J. (July 2010). A novel encryption scheme for data deduplication system. In Proceedings of The 2010 International Conference on Communications, Circuits and Systems (ICCCAS) (pp. 265–269). Wang, C., Qin, Z. g., & Peng, J., & Wang, J. (July 2010). A novel encryption scheme for data deduplication system. In Proceedings of The 2010 International Conference on Communications, Circuits and Systems (ICCCAS) (pp. 265–269).
Zurück zum Zitat Xu, J., Chang, E.-C., & Zhou, J. (2013). Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS ’13) (pp. 195–206). New York: ACM. Xu, J., Chang, E.-C., & Zhou, J. (2013). Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS ’13) (pp. 195–206). New York: ACM.
Zurück zum Zitat Yang, S.-H., & Chen, C.-F. (2005). Robust image hashing based on SPIHT. In Proceedings of The 3rd International Conference on Information Technology: Research and Education (ITRE 2005) (pp. 110–114). New York: IEEE. Yang, S.-H., & Chen, C.-F. (2005). Robust image hashing based on SPIHT. In Proceedings of The 3rd International Conference on Information Technology: Research and Education (ITRE 2005) (pp. 110–114). New York: IEEE.
Zurück zum Zitat Zhao, Y., & Zhuo, L. (2012). A content-based encryption scheme for wireless H. 264 compressed videos. In Proceedings of The 2012 International Conference on Wireless Communications and Signal Processing (WCSP) (pp. 1–6). New York: IEEE. Zhao, Y., & Zhuo, L. (2012). A content-based encryption scheme for wireless H. 264 compressed videos. In Proceedings of The 2012 International Conference on Wireless Communications and Signal Processing (WCSP) (pp. 1–6). New York: IEEE.
Metadaten
Titel
Deduplication Practices for Multimedia Data in the Cloud
verfasst von
Fatema Rashid
Ali Miri
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-53817-4_10

Neuer Inhalt