Abstract
IoT-based medical apparatuses observe the health condition of the patients and upload them to the cloud servers now and then. The increasing popularity and its real-time applications have made IoT healthcare monitoring as a promising technology. However, the redundant healthcare data produced by the IoT medical devices are exponentially growing and reduce the storage efficiency. Executing a deduplication algorithm, identifying the redundant data, and stopping them from entering into the cloud servers helps in improving the storage efficiency. Performing deduplication and stopping redundant data from entering the cloud will improve storage efficiency. However, in existing approaches, the communication overhead is heavy. Traditional hash-based and convergent key-based deduplication approaches use the entire hash values of the data chunks to perform deduplication as well as encryption. It makes the deduplication system vulnerable to confirmation of file attacks (CFA). In addition, convergent key deduplication uses an external key-server or third party to generate keys for users to encrypt their data. Incorporating and trusting external parties increase the security vulnerabilities. In addition, while performing deduplication, existing approaches face a high false-positive error on the hash table. To address these challenges and to improve the performance of the deduplication algorithm, a fog-centric approach is proposed. Instead of sending an entire hash value (α) of the data blocks to the cloud storage, partial hash values (Pαv) are shared with the nearby fog nodes. Each fog node in the fog layer maintains a Scalable Bloom Hash Table (SBHT) to store the partial hash values. Also, SBHT helps in performing inline deduplication. The hash bits of the Pαv are derived and stored in the Scalable Bloomier Hash Table (SBHT), maintained in the fog node to perform inline deduplication. Once the data are proved to be non-redundant, the edge node (client) encrypts the data chunk using an asymmetric Cramer Shoup (CS) cryptosystem and uploads to the cloud storage. The proposed method reduces the communication overhead by 65–70% and improves the security against CFA. In addition, the proposed SBHT reduces false-positive errors and improves storage efficiency, and makes it practical to implement in the real-time IoT healthcare environment.
Similar content being viewed by others
Data Availability
The data that support the findings of this study are openly available in UCI repository at http://archive.ics.uci.edu/ml/datasets/mhealth+dataset, [28].
References
Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. IEEE Access, 5, 26521–26544. https://doi.org/10.1109/access.2017.2775180
Internet of Things (IoT) in healthcare market size, industry report 2025, grand view research, 2019.
Next-generation infrastructure with no-compromise storage and data protection for today and tomorrow, DELL EMC report 2019.
Silva, C. A., Aquino, G. S., Melo, S. R. M., & Egídio, D. J. B. (2019). A fog computing-based architecture for medical records management. Wireless Communications and Mobile Computing, 2019, 1–16. https://doi.org/10.1155/2019/1968960
Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: A review of current applications and security solutions. Journal of Cloud Computing. https://doi.org/10.1186/s13677-017-0090-3
Gantz, J., & Reinsel, D. (2010). The digital universe decade-are you ready? White paper. IDC.
Prathima, C., & Reddy, L. S. S. (2018). A survey on efficient data deduplication in data analytics. SpringerBriefs in Applied Sciences and Technology. https://doi.org/10.1007/978-981-13-0059-2_12
Li, J., Chen, X., Li, M., Li, J., Lee, P. P. C., & Lou, W. (2014). Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625. https://doi.org/10.1109/TPDS.2013.284
Zhou, Y., Feng, D., Xia, W., Fu, M., Huang, F., Zhang, Y., & Li, C. (2015). SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In 2015 31st symposium on mass storage systems and technologies (MSST). https://doi.org/10.1109/msst.2015.7208297.
Li, J., Chen, X., Xhafa, F., & Barolli, L. (2015). Secure deduplication storage systems supporting keyword search. Journal of Computer and System Sciences, 81(8), 1532–1541. https://doi.org/10.1016/j.jcss.2014.12.026
Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering, 28(11), 3113–3125. https://doi.org/10.1109/tkde.2016.2580139
Liu, L., Zhang, Y., & Li, X. (2018). KeyD: Secure key-deduplication with identity-based broadcast encryption. IEEE Transactions on Cloud Computing. https://doi.org/10.1109/tcc.2018.2869333
Liu, X., Lu, T., He, X., Yang, X., & Niu, S. (2020). Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access, 8, 52062–52074. https://doi.org/10.1109/ACCESS.2020.2980627
Wenting, S., Su, Y., & Hao, R. (2020). Lightweight cloud storage auditing with deduplication supporting strong privacy protection. IEEE Access, 8, 44359–44372. https://doi.org/10.1109/access.2020.2977721
Zheng, X., Zhou, Y., Ye, Y., & Li, F. (2019). A cloud data deduplication scheme based on certificate-less proxy re-encryption. Journal of Systems Architecture. https://doi.org/10.1016/j.sysarc.2019.101666
Kharel, J., Reda, H. T., & Shin, S. Y. (2018). Fog computing-based smart health monitoring system deploying LoRa wireless communication. IETE Technical Review. https://doi.org/10.1080/02564602.2017.1406828
Gill, S. S., Arya, R. C., Wander, G. S., & Buyya, R. (2019). Fog-based smart healthcare as a big data and cloud service for heart patients using IoT. In J. Hemanth, X. Fernando, P. Lafata, & Z. Baig (Eds.), International conference on intelligent data communication technologies and internet of things (ICICI) 2018. ICICI 2018. Lecture notes on data engineering and communications technologies. (Vol. 26). Cham: Springer.
Halevi, S., Harnik, D., Pinkas, B., & ShulmanPeleg, A. (2011). Proofs of ownership in remote storage systems. In ACM conference on computer and communications security (pp. 491–500).
Pietro, R. D., & Sorniotti, A. (2012). Boosting efficiency and security in proof of ownership for deduplication. In ACM symposium on information, computer and communications security (pp. 81–92). https://doi.org/10.1145/2414456.2414504.
Blasco, J., Di Pietro, R., Orfila, A., & Sorniotti, A. (2014). A tunable proof of ownership scheme for deduplication using Bloom filters. In IEEE conference on communications and network security (pp. 481–489). https://doi.org/10.1109/CNS.2014.6997518.
Wang, J., Zhao, Z., Xu, Z., Zhang, H., Li, L., & Guo, Y. (2015). I-sieve: An inline high performance deduplication system used in cloud storage. Tsinghua Science and Technology, 20(1), 17–27. https://doi.org/10.1109/TST.2015.7040510
Hou, Z., Chen, X., & Wang, Y. (2017). Content-level deduplication on mobile internet datasets. AIP Conference Proceedings. https://doi.org/10.1063/1.4982026
Li, Y., Hu, L., Xia, K., et al. (2019). Fast distributed video deduplication via locality-sensitive hashing with similarity ranking. Journal on Image and Video Processing. https://doi.org/10.1186/s13640-019-0442-7
Zhong, W., & Liu, Z. (2017). Proof of cipher text ownership based on convergence encryption. AIP Conference Proceedings, 1864, 1. https://doi.org/10.1063/1.4992868
Uma, G., & Jayasimman, L. (2018). Enhanced convergent encryption key generation for secured data deduplication in cloud storage. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/1142/1/012006
Yang, X., Lu, R., Shao, J., Tang, X., & Ghorbani, A. A. (2021). Achieving efficient and privacy-preserving multi-domain big data deduplication in cloud. IEEE Transactions on Services Computing, 14(5), 1292–1305. https://doi.org/10.1109/TSC.2018.2881147
Yang, X., Lu, R., Shao, J., Tang, X., & Ghorbani, A. A. (2022). Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Transactions on Dependable and Secure Computing, 19(1), 591–606. https://doi.org/10.1109/TDSC.2020.2987793.
Mhealth Dataset. Retrieved June 20, 2020, from http://archive.ics.uci.edu/ml/datasets/mhealth+dataset.
Acknowledgements
The authors of this research paper are highly thankful to the Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India for financial support. Also, the authors would like to thank the reviewers in advance for their valuable comments and suggestions.
Funding
The work of this paper is financially supported by the Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India. The Grant Number is ECR/2016/000546.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yoosuf, M.S., Anitha, R. Low Latency Fog-Centric Deduplication Approach to Reduce IoT Healthcare Data Redundancy. Wireless Pers Commun 126, 421–443 (2022). https://doi.org/10.1007/s11277-022-09752-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09752-5