{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:49Z","timestamp":1740149029109,"version":"3.37.3"},"reference-count":39,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T00:00:00Z","timestamp":1536192000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802000","61772418","61472472","61402366","2018JZ6001","2015JQ6236","2016-02"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802000","61772418","61472472","61402366","2018JZ6001","2015JQ6236","2016-02"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802000","61772418","61472472","61402366","2018JZ6001","2015JQ6236","2016-02"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802000","61772418","61472472","61402366","2018JZ6001","2015JQ6236","2016-02"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2017YFB0802000","61772418","61472472","61402366","2018JZ6001","2015JQ6236","2016-02"]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2017YFB0802000","61772418","61472472","61402366","2018JZ6001","2015JQ6236","2016-02"]},{"name":"Xi\u2019an University of Posts and Telecommunications","award":["2017YFB0802000","61772418","61472472","61402366","2018JZ6001","2015JQ6236","2016-02"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018,9,6]]},"abstract":"The rapid advancements in the Internet of Things (IoT) and cloud computing technologies have significantly promoted the collection and sharing of various data. In order to reduce the communication cost and the storage overhead, it is necessary to exploit data deduplication mechanisms. However, existing data deduplication technologies still suffer security and efficiency drawbacks. In this paper, we propose two secure data deduplication schemes based on Rabin fingerprinting over wireless sensing data in cloud computing. The first scheme is based on deterministic tags and the other one adopts random tags. The proposed schemes realize data deduplication before the data is outsourced to the cloud storage server, and hence both the communication cost and the computation cost are reduced. In particular, variable-size block-level deduplication is enabled based on the technique of Rabin fingerprinting which generates data blocks based on the content of the data. Before outsourcing data to the cloud, users encrypt the data based on convergent encryption technologies, which protects the data from being accessed by unauthorized users. Our security analysis shows that the proposed schemes are secure against offline brute-force dictionary attacks. In addition, the random tag makes the second scheme more reliable. Extensive experimental results indicate that the proposed data deduplication schemes are efficient in terms of the deduplication rate, the system operation time, and the tag generation time.<\/jats:p>","DOI":"10.1155\/2018\/9081814","type":"journal-article","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T19:51:24Z","timestamp":1536263484000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-3272","authenticated-orcid":true,"given":"Yinghui","family":"Zhang","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"},{"name":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China"},{"name":"Westone Cryptologic Research Center, Beijing 100070, China"}]},{"given":"Haonan","family":"Su","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8076-3857","authenticated-orcid":true,"given":"Menglei","family":"Yang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8343-3914","authenticated-orcid":true,"given":"Dong","family":"Zheng","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"},{"name":"Westone Cryptologic Research Center, Beijing 100070, China"}]},{"given":"Fang","family":"Ren","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]},{"given":"Qinglan","family":"Zhao","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2687618"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.009"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.07.017"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/sec.421"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6421607"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2366471"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0509-1"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.048"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.017"},{"issue":"9","key":"11","first-page":"3735","volume":"20","year":"2016","journal-title":"Security & Communication Networks"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3435-z"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7202598"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389952"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1574"},{"first-page":"167","volume-title":"Toward network-level efficiency for cloud storage services","year":"2016","key":"16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.4149\/cai_2018_2_327"},{"issue":"10","key":"18","first-page":"3184","volume":"65","year":"2016","journal-title":"Institute of Electrical and Electronics Engineers. Transactions on Computers"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842773"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0975-x"},{"journal-title":"IEEE Internet of Things Journal","year":"2018","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2401017"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1596-6"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0701-7"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1509"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389960"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"31","first-page":"1","volume":"2017","year":"2017","journal-title":"Security and Communication Networks"},{"issue":"6","key":"32","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","year":"2010","journal-title":"IEEE Security & Privacy"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.284"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_21"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.018"},{"journal-title":"IEEE Transactions on Services Computing","year":"2018","key":"39"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844400"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2318320"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2622013"},{"first-page":"143","volume-title":"Some applications of Rabin's fingerprinting method","year":"1993","key":"45"},{"key":"49","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1145\/844128.844155","volume":"36","year":"2002","journal-title":"ACM SIGOPS Operating Systems Review"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/9081814.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/9081814.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/9081814.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T19:51:35Z","timestamp":1536263495000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/9081814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,6]]},"references-count":39,"alternative-id":["9081814","9081814"],"URL":"https:\/\/doi.org\/10.1155\/2018\/9081814","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018,9,6]]}}}