Skip to main content
Log in

Low Latency Fog-Centric Deduplication Approach to Reduce IoT Healthcare Data Redundancy

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

IoT-based medical apparatuses observe the health condition of the patients and upload them to the cloud servers now and then. The increasing popularity and its real-time applications have made IoT healthcare monitoring as a promising technology. However, the redundant healthcare data produced by the IoT medical devices are exponentially growing and reduce the storage efficiency. Executing a deduplication algorithm, identifying the redundant data, and stopping them from entering into the cloud servers helps in improving the storage efficiency. Performing deduplication and stopping redundant data from entering the cloud will improve storage efficiency. However, in existing approaches, the communication overhead is heavy. Traditional hash-based and convergent key-based deduplication approaches use the entire hash values of the data chunks to perform deduplication as well as encryption. It makes the deduplication system vulnerable to confirmation of file attacks (CFA). In addition, convergent key deduplication uses an external key-server or third party to generate keys for users to encrypt their data. Incorporating and trusting external parties increase the security vulnerabilities. In addition, while performing deduplication, existing approaches face a high false-positive error on the hash table. To address these challenges and to improve the performance of the deduplication algorithm, a fog-centric approach is proposed. Instead of sending an entire hash value (α) of the data blocks to the cloud storage, partial hash values (Pαv) are shared with the nearby fog nodes. Each fog node in the fog layer maintains a Scalable Bloom Hash Table (SBHT) to store the partial hash values. Also, SBHT helps in performing inline deduplication. The hash bits of the Pαv are derived and stored in the Scalable Bloomier Hash Table (SBHT), maintained in the fog node to perform inline deduplication. Once the data are proved to be non-redundant, the edge node (client) encrypts the data chunk using an asymmetric Cramer Shoup (CS) cryptosystem and uploads to the cloud storage. The proposed method reduces the communication overhead by 65–70% and improves the security against CFA. In addition, the proposed SBHT reduces false-positive errors and improves storage efficiency, and makes it practical to implement in the real-time IoT healthcare environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

The data that support the findings of this study are openly available in UCI repository at http://archive.ics.uci.edu/ml/datasets/mhealth+dataset, [28].

References

  1. Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. IEEE Access, 5, 26521–26544. https://doi.org/10.1109/access.2017.2775180

    Article  Google Scholar 

  2. Internet of Things (IoT) in healthcare market size, industry report 2025, grand view research, 2019.

  3. Next-generation infrastructure with no-compromise storage and data protection for today and tomorrow, DELL EMC report 2019.

  4. Silva, C. A., Aquino, G. S., Melo, S. R. M., & Egídio, D. J. B. (2019). A fog computing-based architecture for medical records management. Wireless Communications and Mobile Computing, 2019, 1–16. https://doi.org/10.1155/2019/1968960

    Article  Google Scholar 

  5. Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: A review of current applications and security solutions. Journal of Cloud Computing. https://doi.org/10.1186/s13677-017-0090-3

    Article  Google Scholar 

  6. Gantz, J., & Reinsel, D. (2010). The digital universe decade-are you ready? White paper. IDC.

    Google Scholar 

  7. Prathima, C., & Reddy, L. S. S. (2018). A survey on efficient data deduplication in data analytics. SpringerBriefs in Applied Sciences and Technology. https://doi.org/10.1007/978-981-13-0059-2_12

    Article  Google Scholar 

  8. Li, J., Chen, X., Li, M., Li, J., Lee, P. P. C., & Lou, W. (2014). Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625. https://doi.org/10.1109/TPDS.2013.284

    Article  Google Scholar 

  9. Zhou, Y., Feng, D., Xia, W., Fu, M., Huang, F., Zhang, Y., & Li, C. (2015). SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In 2015 31st symposium on mass storage systems and technologies (MSST). https://doi.org/10.1109/msst.2015.7208297.

  10. Li, J., Chen, X., Xhafa, F., & Barolli, L. (2015). Secure deduplication storage systems supporting keyword search. Journal of Computer and System Sciences, 81(8), 1532–1541. https://doi.org/10.1016/j.jcss.2014.12.026

    Article  MathSciNet  MATH  Google Scholar 

  11. Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering, 28(11), 3113–3125. https://doi.org/10.1109/tkde.2016.2580139

    Article  Google Scholar 

  12. Liu, L., Zhang, Y., & Li, X. (2018). KeyD: Secure key-deduplication with identity-based broadcast encryption. IEEE Transactions on Cloud Computing. https://doi.org/10.1109/tcc.2018.2869333

    Article  Google Scholar 

  13. Liu, X., Lu, T., He, X., Yang, X., & Niu, S. (2020). Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access, 8, 52062–52074. https://doi.org/10.1109/ACCESS.2020.2980627

    Article  Google Scholar 

  14. Wenting, S., Su, Y., & Hao, R. (2020). Lightweight cloud storage auditing with deduplication supporting strong privacy protection. IEEE Access, 8, 44359–44372. https://doi.org/10.1109/access.2020.2977721

    Article  Google Scholar 

  15. Zheng, X., Zhou, Y., Ye, Y., & Li, F. (2019). A cloud data deduplication scheme based on certificate-less proxy re-encryption. Journal of Systems Architecture. https://doi.org/10.1016/j.sysarc.2019.101666

    Article  Google Scholar 

  16. Kharel, J., Reda, H. T., & Shin, S. Y. (2018). Fog computing-based smart health monitoring system deploying LoRa wireless communication. IETE Technical Review. https://doi.org/10.1080/02564602.2017.1406828

    Article  Google Scholar 

  17. Gill, S. S., Arya, R. C., Wander, G. S., & Buyya, R. (2019). Fog-based smart healthcare as a big data and cloud service for heart patients using IoT. In J. Hemanth, X. Fernando, P. Lafata, & Z. Baig (Eds.), International conference on intelligent data communication technologies and internet of things (ICICI) 2018. ICICI 2018. Lecture notes on data engineering and communications technologies. (Vol. 26). Cham: Springer.

    Google Scholar 

  18. Halevi, S., Harnik, D., Pinkas, B., & ShulmanPeleg, A. (2011). Proofs of ownership in remote storage systems. In ACM conference on computer and communications security (pp. 491–500).

  19. Pietro, R. D., & Sorniotti, A. (2012). Boosting efficiency and security in proof of ownership for deduplication. In ACM symposium on information, computer and communications security (pp. 81–92). https://doi.org/10.1145/2414456.2414504.

  20. Blasco, J., Di Pietro, R., Orfila, A., & Sorniotti, A. (2014). A tunable proof of ownership scheme for deduplication using Bloom filters. In IEEE conference on communications and network security (pp. 481–489). https://doi.org/10.1109/CNS.2014.6997518.

  21. Wang, J., Zhao, Z., Xu, Z., Zhang, H., Li, L., & Guo, Y. (2015). I-sieve: An inline high performance deduplication system used in cloud storage. Tsinghua Science and Technology, 20(1), 17–27. https://doi.org/10.1109/TST.2015.7040510

    Article  Google Scholar 

  22. Hou, Z., Chen, X., & Wang, Y. (2017). Content-level deduplication on mobile internet datasets. AIP Conference Proceedings. https://doi.org/10.1063/1.4982026

    Article  Google Scholar 

  23. Li, Y., Hu, L., Xia, K., et al. (2019). Fast distributed video deduplication via locality-sensitive hashing with similarity ranking. Journal on Image and Video Processing. https://doi.org/10.1186/s13640-019-0442-7

    Article  Google Scholar 

  24. Zhong, W., & Liu, Z. (2017). Proof of cipher text ownership based on convergence encryption. AIP Conference Proceedings, 1864, 1. https://doi.org/10.1063/1.4992868

    Article  Google Scholar 

  25. Uma, G., & Jayasimman, L. (2018). Enhanced convergent encryption key generation for secured data deduplication in cloud storage. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/1142/1/012006

    Article  Google Scholar 

  26. Yang, X., Lu, R., Shao, J., Tang, X., & Ghorbani, A. A. (2021). Achieving efficient and privacy-preserving multi-domain big data deduplication in cloud. IEEE Transactions on Services Computing, 14(5), 1292–1305. https://doi.org/10.1109/TSC.2018.2881147

    Article  Google Scholar 

  27. Yang, X., Lu, R., Shao, J., Tang, X., & Ghorbani, A. A. (2022). Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Transactions on Dependable and Secure Computing, 19(1), 591–606. https://doi.org/10.1109/TDSC.2020.2987793.

    Article  Google Scholar 

  28. Mhealth Dataset. Retrieved June 20, 2020, from http://archive.ics.uci.edu/ml/datasets/mhealth+dataset.

Download references

Acknowledgements

The authors of this research paper are highly thankful to the Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India for financial support. Also, the authors would like to thank the reviewers in advance for their valuable comments and suggestions.

Funding

The work of this paper is financially supported by the Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India. The Grant Number is ECR/2016/000546.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Sirajudeen Yoosuf.

Ethics declarations

Conflict of interest

All authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yoosuf, M.S., Anitha, R. Low Latency Fog-Centric Deduplication Approach to Reduce IoT Healthcare Data Redundancy. Wireless Pers Commun 126, 421–443 (2022). https://doi.org/10.1007/s11277-022-09752-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09752-5

Keywords

Navigation