{"id":"https://openalex.org/W2900957219","doi":"https://doi.org/10.1109/tsc.2018.2881147","title":"Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud","display_name":"Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud","publication_year":2018,"publication_date":"2018-11-13","ids":{"openalex":"https://openalex.org/W2900957219","doi":"https://doi.org/10.1109/tsc.2018.2881147","mag":"2900957219"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2018.2881147","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2018.2881147","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045406560","display_name":"Xue Yang","orcid":"https://orcid.org/0000-0002-4083-729X"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xue Yang","raw_affiliation_strings":["Information Security and National Computing Grid Laboratory, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Information Security and National Computing Grid Laboratory, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040489898","display_name":"Jun Shao","orcid":"https://orcid.org/0000-0001-8352-0973"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jun Shao","raw_affiliation_strings":["Faculty of Computer Science, Canadian Institute of Cybersecurity, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Canadian Institute of Cybersecurity, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029840191","display_name":"Xiaohu Tang","orcid":"https://orcid.org/0000-0002-7938-7812"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohu Tang","raw_affiliation_strings":["School of Computer and Information Engineering, Zhejiang Gongshang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Zhejiang Gongshang University, Zhejiang, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034685391","display_name":"Ali A. Ghorbani","orcid":"https://orcid.org/0000-0001-9189-6268"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ali A. Ghorbani","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5045406560"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":null,"apc_paid":null,"fwci":3.6973,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.94457469,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"14","issue":"5","first_page":"1292","last_page":"1305"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9340000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.8899717330932617},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8583917617797852},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6601914167404175},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6267394423484802},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6090165376663208},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.584969162940979},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5729141235351562},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5319904088973999},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41241228580474854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3592802882194519},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32768282294273376},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08048847317695618}],"concepts":[{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.8899717330932617},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8583917617797852},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6601914167404175},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6267394423484802},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6090165376663208},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.584969162940979},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5729141235351562},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5319904088973999},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41241228580474854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3592802882194519},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32768282294273376},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08048847317695618},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2018.2881147","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2018.2881147","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2187378109","display_name":null,"funder_award_id":"61472364","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2235123106","display_name":null,"funder_award_id":"LZ18F020003","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W19697680","https://openalex.org/W1519809459","https://openalex.org/W1584117873","https://openalex.org/W1589843374","https://openalex.org/W1660562555","https://openalex.org/W1798609567","https://openalex.org/W1892798954","https://openalex.org/W1905774212","https://openalex.org/W1969949656","https://openalex.org/W2009191935","https://openalex.org/W2019927367","https://openalex.org/W2034326924","https://openalex.org/W2043944888","https://openalex.org/W2063421119","https://openalex.org/W2110322986","https://openalex.org/W2112138431","https://openalex.org/W2116556172","https://openalex.org/W2124218043","https://openalex.org/W2125858711","https://openalex.org/W2157240622","https://openalex.org/W2161694911","https://openalex.org/W2164988972","https://openalex.org/W2165257856","https://openalex.org/W2167882086","https://openalex.org/W2168529291","https://openalex.org/W2230451675","https://openalex.org/W2317570624","https://openalex.org/W2467820268","https://openalex.org/W2510521379","https://openalex.org/W2540126579","https://openalex.org/W2568154862","https://openalex.org/W2731419512","https://openalex.org/W2751054914","https://openalex.org/W2751141499","https://openalex.org/W2753439427","https://openalex.org/W2754234120","https://openalex.org/W2767846115","https://openalex.org/W2900957219","https://openalex.org/W3145128584","https://openalex.org/W4246219036","https://openalex.org/W6600801457","https://openalex.org/W6677607623","https://openalex.org/W6684533685"],"related_works":["https://openalex.org/W3133558527","https://openalex.org/W4377151536","https://openalex.org/W2951912353","https://openalex.org/W3085180063","https://openalex.org/W2579975022","https://openalex.org/W2924118940","https://openalex.org/W1519809459","https://openalex.org/W3029091521","https://openalex.org/W2900957219","https://openalex.org/W2113801413"],"abstract_inverted_index":{"Secure":[0],"data":[1,112,141,191,199],"deduplication,":[2,69],"as":[3,176,178],"it":[4,35],"can":[5,42,168],"eliminate":[6],"redundancies":[7],"over":[8],"encrypted":[9],"data,":[10,135],"has":[11,30],"been":[12,31],"widely":[13],"developed":[14],"in":[15,46,102],"cloud":[16,157],"storage":[17,20],"to":[18,38,51,59,62,74,93,160],"reduce":[19],"space":[21,49],"and":[22,109,126,156,163,193,198,222],"communication":[23],"overheads.":[24],"Among":[25],"them,":[26],"the":[27,83,99,154,170,194,214,219,223,227],"convergent":[28],"encryption":[29],"extensively":[32],"adopted.":[33],"However,":[34],"is":[36,71],"vulnerable":[37],"brute-force":[39,64,149,203],"attacks":[40],"that":[41,184,209],"determine":[43],"which":[44,70],"plaintext":[45],"a":[47,52,116,123,127],"message":[48,84,171,195],"corresponds":[50],"given":[53],"ciphertext.":[54],"Many":[55],"existing":[56,79,215],"schemes":[57,80],"have":[58],"sacrifice":[60],"efficiency":[61],"resist":[63],"attacks,":[65],"especially":[66,218],"for":[67,115,133,189],"cross-domain":[68],"inevitably":[72],"contrary":[73],"practical":[75],"applications.":[76],"Moreover,":[77],"few":[78],"consider":[81],"protecting":[82],"equality":[85,172,196],"information":[86,173,197],"(i.e.,":[87],"whether":[88],"two":[89],"different":[90],"ciphertexts":[91,132],"correspond":[92],"an":[94,107],"identical":[95],"plaintext).":[96],"To":[97],"address":[98],"above":[100],"challenges,":[101],"this":[103],"paper,":[104],"we":[105],"propose":[106],"efficient":[108],"privacy-preserving":[110],"big":[111],"deduplication":[113,145],"scheme":[114,137,167,186,211],"two-level":[117],"multi-domain":[118,144],"architecture.":[119],"Specifically,":[120],"by":[121],"generating":[122],"random":[124,131],"tag":[125],"constant":[128],"number":[129],"of":[130,226],"each":[134],"our":[136,166,185,210],"not":[138],"only":[139,153],"ensures":[140],"confidentiality":[142],"under":[143],"but":[146],"also":[147],"resists":[148],"attacks.":[150,204],"By":[151],"allowing":[152],"agent":[155],"service":[158],"provider":[159],"perform":[161],"intra-deduplication":[162],"inter-deduplication,":[164],"respectively,":[165],"protect":[169],"from":[174],"disclosure":[175],"much":[177],"possible.":[179],"Detailed":[180],"security":[181],"analysis":[182],"shows":[183],"achieves":[187],"privacy-preservation":[188],"both":[190],"content":[192],"integrity":[200],"while":[201],"resisting":[202],"Furthermore,":[205],"extensive":[206],"simulations":[207],"demonstrate":[208],"significantly":[212],"outperforms":[213],"competing":[216],"schemes,":[217],"computational":[220],"cost":[221],"time":[224],"complexity":[225],"duplicate":[228],"search.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2025-10-10T00:00:00"}
