skip to main content
10.1145/2714576.2714628acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Enabling Encrypted Cloud Media Center with Secure Deduplication

Published: 14 April 2015 Publication History

Abstract

Multimedia contents, especially videos, are being exponentially generated today. Due to the limited local storage, people are willing to store the videos at the remote cloud media center for its low cost and scalable storage. However, videos may have to be encrypted before outsourcing for privacy concerns. For practical purposes, the cloud media center should also provide the deduplication functionality to eliminate the storage and bandwidth redundancy, and adaptively disseminate videos to heterogeneous networks and different devices to ensure the quality of service. In light of the observations, we present a secure architecture enabling the encrypted cloud media center. It builds on top of latest advancements on secure deduplication and video coding techniques, with fully functional system implementations on encrypted video deduplication and adaptive video dissemination services. Specifically, to support efficient adaptive dissemination, we utilize the scalable video coding (SVC) techniques and propose a tailored layer-level secure deduplication strategy to be compatible with the internal structure of SVC. Accordingly, we adopt a structure-compatible encryption mechanism and optimize the way how encrypted SVC videos are stored for fast retrieval and efficient dissemination. We thoroughly analyze the security strength of our system design with strong video protection. Furthermore, we give a prototype implementation with encrypted end-to-end deployment on Amazon cloud platform. Extensive experiments demonstrate the practicality of our system.

References

[1]
Akamai. The Akamai State of the Internet Report. http://www.akamai.com/stateoftheinternet/.
[2]
M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Server-aided encryption for deduplicated storage. In Proc. of USENIX Security, 2013.
[3]
M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In Proc. of EUROCRYPT, 2013.
[4]
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-rsa-inversion problems and the security of chaum's blind signature scheme. Journal of Cryptology, 16(3):185--215, 2003.
[5]
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In Proc. of IEEE SP, 2007.
[6]
M. Blestel and M. Raulet. Open svc decoder: a flexible svc library. In Proc. of ACM MM, 2010.
[7]
J. Camenisch, G. Neven, and A. Shelat. Simulatable adaptive oblivious transfer. In Proc. of EUROCRYPT, 2007.
[8]
Cisco Visual Networking Index. Global mobile data traffic forecast update: 2012--2017.
[9]
R. H. Deng, X. Ding, Y. Wu, and Z. Wei. Efficient block-based transparent encryption for h.264/svc bitstreams. Multimedia Systems, 20(2):165--178, 2014.
[10]
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Proc. of IEEE ICDCS, 2002.
[11]
S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Theory of Cryptography, Lecture Notes in Computer Science, pages 577--594. Springer, 2009.
[12]
A. Kathpal, M. Kulkarni, and A. Bakre. Analyzing compute vs. storage tradeoff for video-aware storage efficiency. In Proc. of USENIX HotStorage, 2012.
[13]
S. Lederer, C. Müller, and C. Timmerer. Dynamic adaptive streaming over http dataset. In Proc. of ACM MMSys, 2012.
[14]
J. Li, X. Chen, M. Li, J. Li, P. P. Lee, and W. Lou. Secure deduplication with efficient and reliable convergent key management. IEEE Trans. on Parallel and Distributed Systems, 25(6):1615--1625, 2014.
[15]
North Carolina Daily. Snapchat nude photos, videos reportedly leaked online. http://www.northcarolinadaily.com/index.php/sid/226634683, 2014.
[16]
S. Oh, A. Hoogs, A. Perera, N. Cuntoor, C.-C. Chen, J. T. Lee, S. Mukherjee, J. Aggarwal, H. Lee, L. Davis, et al. A large-scale benchmark dataset for event recognition in surveillance video. In Proc. of IEEE CVPR, 2011.
[17]
P. Puzio, R. Molva, M. Önen, and S. Loureiro. Cloudedup: secure deduplication with encrypted data for cloud storage. In Proc. of IEEE CloudCom, 2013.
[18]
Y. Sanchez, T. Schierl, C. Hellge, T. Wiegand, D. Hong, D. D. Vleeschauwer, W. V. Leekwijck, and Y. L. Louédec. Efficient http-based streaming using scalable video coding. Signal Processing: Image Communication, 27(4):329--342, 2012.
[19]
H. Schwarz, D. Marpe, and T. Wiegand. Overview of the scalable video coding extension of the h.264/avc standard. IEEE Trans. on Circuits and System for Video Technology, 17(9):1103--1120, 2007.
[20]
T. Stutz and A. Uhl. A survey of h. 264 avc/svc encryption. IEEE Trans. on Circuits and Systems for Video Technology, 22(3):325--339, 2012.
[21]
Z. Wei, Y. Wu, R. H. Deng, and X. Ding. A hybrid scheme for authenticating scalable video codestreams. IEEE Trans. on Information Forensics and Security, 9(4):543--553, 2014.
[22]
Z. Wei, Y. Wu, X. Ding, and R. H. Deng. A scalable and format-compliant encryption scheme for h.264/svc bitstreams. Signal Processing: Image Communication, 27(9):1011--1024, 2012.
[23]
Y. Wu, Z. Wei, and R. H. Deng. Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Trans. on Multimedia, 15(4):778--788, 2013.
[24]
S. Xiang. Scalable streaming. https://sites.google.com/site/svchttpstreaming/storagesaving.
[25]
J. Xu, E. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proc. of ACM AISACCS, 2013.
[26]
W. Zhu, C. Luo, J. Wang, and S. Li. Multimedia cloud computing. IEEE Signal Processing Magazine, 28(3):59--69, 2011.

Cited By

View all
  • (2024)Optimizing the Performance of Consistency-Aware Deduplication Using Persistent MemoryIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.334730543:6(1691-1703)Online publication date: Jun-2024
  • (2024)DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments2024 21st Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST62714.2024.10788052(1-11)Online publication date: 28-Aug-2024
  • (2024)Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applicationsCluster Computing10.1007/s10586-023-04209-127:1(1063-1087)Online publication date: 10-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
April 2015
698 pages
ISBN:9781450332453
DOI:10.1145/2714576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 April 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloud media center
  2. layer-level deduplication
  3. scalable video coding
  4. secure deduplication

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '15
Sponsor:
ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security
April 14 - March 17, 2015
Singapore, Republic of Singapore

Acceptance Rates

ASIA CCS '15 Paper Acceptance Rate 48 of 269 submissions, 18%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Optimizing the Performance of Consistency-Aware Deduplication Using Persistent MemoryIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.334730543:6(1691-1703)Online publication date: Jun-2024
  • (2024)DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments2024 21st Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST62714.2024.10788052(1-11)Online publication date: 28-Aug-2024
  • (2024)Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applicationsCluster Computing10.1007/s10586-023-04209-127:1(1063-1087)Online publication date: 10-Jan-2024
  • (2022)CADedup: High-performance Consistency-aware Deduplication Based on Persistent Memory2022 IEEE 40th International Conference on Computer Design (ICCD)10.1109/ICCD56317.2022.00111(726-729)Online publication date: Oct-2022
  • (2021)Game-theoretic analysis of encrypted cloud data deduplicationData Deduplication Approaches10.1016/B978-0-12-823395-5.00007-0(335-356)Online publication date: 2021
  • (2020)Towards Thwarting Template Side-channel Attacks in Secure Cloud DeduplicationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.2911502(1-1)Online publication date: 2020
  • (2020)Triplet Loss Feature Aggregation for Scalable HashICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP40776.2020.9053908(1918-1922)Online publication date: May-2020
  • (2019)Game Theoretical Analysis on Encrypted Cloud Data DeduplicationIEEE Transactions on Industrial Informatics10.1109/TII.2019.292040215:10(5778-5789)Online publication date: Oct-2019
  • (2018)HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth SystemsIEEE Transactions on Industrial Informatics10.1109/TII.2018.283225114:9(4101-4112)Online publication date: Sep-2018
  • (2018)Mitigating Traffic-Based Side Channel Attacks in Bandwidth-Efficient Cloud Storage2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)10.1109/IPDPS.2018.00124(1153-1162)Online publication date: May-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media