Browse > Article
http://dx.doi.org/10.3837/tiis.2019.06.026

Secure and Efficient Storage of Video Data in a CCTV Environment  

Kim, Won-Bin (Department of Computer Science and Engineering, Soonchunhyang University)
Lee, Im-Yeong (Department of Computer Science and Engineering, Soonchunhyang University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.6, 2019 , pp. 3238-3257 More about this Journal
Abstract
Closed-circuit television (CCTV) technology continuously captures and stores video streams. Users are typically required by policy to store all the captured video for a certain period. Accordingly, increasing the number of CCTV operation cycles and photographing positions expands the amount of data to be stored. However, expanding the available storage space for video data incurs increased costs. In recent years, this problem has been addressed with cloud storage solutions, which enable multiple users and devices to access and store data simultaneously. However, because of the large amount of data to be stored, a vast storage space is required. Consequently, cloud storage administrators need a way to store data more efficiently. To save storage space, deduplication technology has been proposed to prevent duplicate storage of the same data. However, because cloud storage is hosted on remote servers, data encryption technology must be applied to address data exposure issues. Although deduplication techniques for encrypted data have been studied, there have been various security vulnerabilities. We attempted to solve this problem by addressing various issues such as poison attacks, property forgery, and ownership management while removing the redundant data and handling the data more securely.
Keywords
Cloud storage; data deduplication; data encryption; closed-circuit television (CCTV); ownership management;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. Halevi, D. Harnik, B. Pinkas and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proc. of the 18th ACM conference on Computer and communications security - CCS '11, pp. 491-500, 2011.
2 J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system" in Proc. of 22nd International Conference on Distributed Computing Systems.
3 K. Kim, T. -Y. Youn, N. -S. Jho and K. -Y. Chang, "Client-Side Deduplication to Enhance Security and Reduce Communication Costs," ETRI Journal, vol. 39, no. 1, pp. 116-123, Feb. 2017.   DOI
4 M. Bellare, S. Keelveedhi, T. Ristenpart, "DupLESS: Server-Aided Encryption for Deduplicated Storage," IACR Cryptology ePrint Archive, 429, 2013.
5 J. Hur, D. Koo, Y. Shin and K. Kang, "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage," IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 11, pp. 3113-3125, Nov. 2016.   DOI
6 M. Naor and O. Reingold, "Number-theoretic constructions of efficient pseudo-random functions," Journal of the ACM, vol. 51, no. 2, pp. 231-262, Mar. 2004.   DOI
7 D. Chaum, "Blind Signatures for Untraceable Payments," Advances in Cryptology, Springer US, pp. 199-203, 1983.
8 M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko, "The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme," Journal of Cryptology, vol. 16, no. 3, pp. 185-215, Jun. 2003.   DOI
9 N. Kaaniche and M. Laurent, "A Secure Client Side Deduplication Scheme in Cloud Storage Environments," in Proc. of 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-7, 2014.
10 K. W. Kim, Y. H. Joo and Y. I. Eom, "Deduplication Technologies over Encrypted Data," in Proc. of Symposium of the Korean Institute of Communications and Information Sciences, vol. 33, no. 1, pp. 68-77, Feb. 2018.
11 P. Puzio, R. Molva, M. Onen and S. Loureiro, "PerfectDedup: Secure Data Deduplication," Lecture Notes in Computer Science, Springer International Publishing, vol. 9481, pp. 150-166, 2016.
12 P. Puzio, R. Molva, M. Onen and S. Loureiro, "ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage," in Proc. of 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013.
13 M. W. Storer, K. Greenan, D. D. E. Long and E. L. Miller, "Secure data deduplication," in Proc. of the 4th ACM international workshop on Storage security and survivability - StorageSS '08, pp. 1-10, 2008.
14 M. Bellare, S. Keelveedhi and T. Ristenpart, "Message-Locked Encryption and Secure Deduplication," in Proc. of Advances in Cryptology - EUROCRYPT 2013, Springer Berlin Heidelberg, pp. 296-312, 2013.