Skip to main content
Log in

Version-vector based video data online cloud backup in smart campus

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

As a kind of popular multimedia service, the video business in smart campus is fully developed, and the data volume is experiencing a continuous tremendous growth. However, the video data storage also needs to cope with many security threats resulted from some uncertainly factors. Recently, data backup has been credited as an important method to address these issues. Yet, how to improve the efficiency of video data online backup remains a critical challenge. In the context of cloud computing, a version-vector based video data online backup system is proposed in this paper, which fully implements three important functions, e.g., backup, indexing and recovery. At the time of the client backuping the data to the server, the version vectors of files and data chunks are produced as metadata. Accordingly, only through exchanging a small amount of metadata between the data nodes, it can identify the redundant data such that breaking the limitations on file-level deduplication and data-chunk-level deduplication in the existing backup systems, and can further improve the performance of backup, indexing and recovery. The conducted experiments have been shown to demonstrate the efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Alfalou A, Brosseau C, Abdallah N (2015) Simultaneous compression and encryption of color video images. Opti Commun 104:371–379

    Article  Google Scholar 

  2. Alsmirat MA, Jararweh Y, Obaidat I et al (2017) Automated wireless video surveillance: an evaluation framework. J Real-Time Image Proc 13(3):527–546

    Article  Google Scholar 

  3. Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2018) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl, 1–40. https://doi.org/10.1007/s11042-017-5537-5

  4. Atawneh S, Almomani A, Bazar HA et al (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in dwt domain. Multimed Tools Appl 76(18):18,451–18,472

    Article  Google Scholar 

  5. Bouchrika I, Carter JN, Nixon MS (2016) Towards automated visual surveillance using gait for identity recognition and tracking across multiple non-intersecting cameras. Multimed Tools Appl 75(2):1201–1221

    Article  Google Scholar 

  6. Chang V, Gary W (2016) A model to compare cloud and non-cloud storage of big data. Futur Gener Comput Syst 57:56–76

    Article  Google Scholar 

  7. Chervenak AL, Vellanki V, Kurmas Z (1998) Protecting file systems: a survey of backup techniques. In: Proceedings of Joint NASA and IEEE mass storage conference, pp 17–31

  8. Christen P (2012) A survey of indexing techniques for scalable record linkage and deduplication. IEEE Trans Knowl Data Eng 24(9):1537–1555

    Article  Google Scholar 

  9. Edstrom J, Chen D, Gong Y et al (2017) Data-pattern enabled self-recovery low-power storage system for big video data. IEEE Transactions on Big Data. https://doi.org/10.1109/TBDATA20172750699

  10. Esposito C, Ficco M, Palmieri F, Castiglione A (2016) Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans Comput 65(8):2348–2362

    Article  MathSciNet  Google Scholar 

  11. Fu Y, Jiang H, Xiao N, Tian L, Liu F, Xu L (2014) Application-aware local-global source deduplication for cloud backup services of personal storage. IEEE Trans Parallel Distrib Syst 25(5):1155–1165

    Article  Google Scholar 

  12. Gani A, Siddiqa A, Shamshirband S, Hanum F (2016) A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl Inf Syst 46(2):241–284

    Article  Google Scholar 

  13. Gupta S, Neha G, Kirti A (2014) A review of comparative study of md5 and ssh security algorithm. Int J Comput Appl 104(14):1–4

    Google Scholar 

  14. Hossain MS, Muhammad G, Abdul W et al (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Futur Gener Comput Syst 83:596–606

    Article  Google Scholar 

  15. Huang T (2014) Surveillance video: the biggest big data. Comput Now 7(2):82–91

    Google Scholar 

  16. Levitin G, Xing L, Zhai Q, Dai Y (2016) Optimization of full versus incremental periodic backup policy. IEEE Trans Depend Secur Comput 13(6):644–656

    Article  Google Scholar 

  17. Li J, Chen X, Li M et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Article  Google Scholar 

  18. Li J, Chen X, Huang X et al (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579

    Article  MathSciNet  Google Scholar 

  19. Li J, Li YK, Chen X et al (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216

    Article  Google Scholar 

  20. Li P, Li J, Huang Z et al (2017) Multi-key privacy-preserving deep learning in cloud computing. Futur Gener Comput Syst 74:76–85

    Article  Google Scholar 

  21. Li B, Huang Y, Liu Z, Li J et al (2018) Hybridoram: practical oblivious cloud storage with constant bandwidth. Information Sciences. https://doi.org/10.1016/j.ins.2018.02.019

  22. Li Y, Wang G, Nie L, Wang Q (2018) Distance metric optimization driven convolutional neural network for age invariant face recognition. Pattern Recogn 75:51–62

    Article  Google Scholar 

  23. Mao B, Jiang H, Wu S, Tian L (2016) Leveraging data deduplication to improve the performance of primary storage systems in the cloud. IEEE Trans Comput 65(6):1775–1788

    Article  MathSciNet  Google Scholar 

  24. Nakamura S, Zhao X, Nakagawa T (2017) Constant and random full backup models with incremental and differential backup schemes. Int J Reliab Qual Safe Eng 24(3):1750,015

    Article  Google Scholar 

  25. Neelaveni P, Vijayalakshmi M (2015) Fc-lid: file classifier based linear indexing for deduplication in cloud backup services. In: Proceedings of international conference on distributed computing and internet technology, pp 213–222

  26. Park D, Fan Z, Nam YJ, Du DHC (2017) A lookahead read cache: improving read performance for deduplication backup storage. J Comput Sci Technol 32(1):26–40

    Article  Google Scholar 

  27. Paulo J, Pereira J (2014) A survey and classification of storage deduplication systems. ACM Computing Surveys (CSUR) 47(1):11

    Article  MathSciNet  Google Scholar 

  28. Shen J, Gui Z, Ji S et al (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2018.01.003

  29. Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv (CSUR) 49(4):74

    Article  Google Scholar 

  30. Son Y, Choi J, Jeon J et al (2017) Ssd-assisted backup and recovery for database systems. In: Proceedings of IEEE 33rd international conference on data engineering (ICDE), pp 285–296

  31. Song C, Park S, Kim D, Kang SK (2011) Parity cloud service: a privacy-protected personal data recovery service. In: Proceedings of IEEE 10th International conference on trust, security and privacy in computing and communications (TrustCom), pp 812–817

  32. Tao M, Ota K, Dong M (2017) Ontology-based data semantic management and application in iot- and cloud-enabled smart homes. Futur Gener Comput Syst 76:528–539

    Article  Google Scholar 

  33. Vezzani R, Cucchiara R (2010) Video surveillance online repository (visor): an integrated framework. Multimed Tools Appl 50(2):359–380

    Article  Google Scholar 

  34. Wang C, Wang Q, Ren K, Cao W, Lou N (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232

    Article  Google Scholar 

  35. Wang G, Chen S, Lin M et al (2014) Sbbs: a sliding blocking algorithm with backtracking sub-blocks for duplicate data detection. Expert Syst Appl 41(5):2415–2423

    Article  Google Scholar 

  36. Xia W, Jiang H, Feng D, Hua Y (2015) Similarity and locality based indexing for high performance data deduplication. IEEE Trans Comput 64(4):1162–1176

    Article  MathSciNet  Google Scholar 

  37. Xia W, Jiang H, Feng D, Tian L (2016) Dare: a deduplication-aware resemblance detection and elimination scheme for data reduction with low overheads. IEEE Trans Comput 65(6):1692–1705

    Article  MathSciNet  Google Scholar 

  38. Xiong Y, Cheng Z, Lu C et al (2016) An energy-aware workload balancing method for cloud video data storage management. In: Proceedings of international conference on advanced cloud and big data (CBD), pp 7–12

  39. Xu Q, Zhao L, Xiao M, Liu A, Dai Y (2015) Yurubackup: a space-efficient and highly scalable incremental backup system in the cloud. Int J Parallel Prog 43 (3):316–338

    Article  Google Scholar 

  40. Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  41. Zhang P, Huang P, He X, Wang H, Zhou K (2017) Resemblance and mergence based indexing for high performance data deduplication. J Syst Softw 128:11–24

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Key R&D Program of China (Grand No. 2016YFD0400206), the National Natural Science Fund, China (Grant Nos. 61300198 & 61572131 & 61772233); the Guangdong University Scientific Innovation Project (Grant No. 2017KTSCX178); the outstanding young teacher training program of the Education Department of Guangdong Province (Grant No. YQ2015158); Guangdong Provincial Science & Technology Plan Projects (Grant No. 2016A010101035 & 2016A010101034).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ming Tao or Huaqiang Yuan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tao, M., Wei, W., Yuan, H. et al. Version-vector based video data online cloud backup in smart campus. Multimed Tools Appl 78, 3435–3456 (2019). https://doi.org/10.1007/s11042-018-6106-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6106-2

Keywords

Navigation