dc.contributor |
Aalto-yliopisto |
fi |
dc.contributor |
Aalto University |
en |
dc.contributor.author |
Liang, Xueqin |
|
dc.contributor.author |
Yan, Zheng |
|
dc.contributor.author |
Chen, Xiaofeng |
|
dc.contributor.author |
Yang, Laurence T. |
|
dc.contributor.author |
Lou, Wenjing |
|
dc.contributor.author |
Hou, Thomas |
|
dc.date.accessioned |
2019-09-20T11:13:39Z |
|
dc.date.available |
2019-09-20T11:13:39Z |
|
dc.date.issued |
2019-10 |
|
dc.identifier.citation |
Liang , X , Yan , Z , Chen , X , Yang , L T , Lou , W & Hou , T 2019 , ' Game Theoretical Analysis on Encrypted Cloud Data Deduplication ' , IEEE Transactions on Industrial Informatics , vol. 15 , no. 10 , pp. 5778-5789 . https://doi.org/10.1109/TII.2019.2920402 |
en |
dc.identifier.issn |
1551-3203 |
|
dc.identifier.other |
PURE UUID: 99ff533b-7caa-413f-b3b0-14b1994a2af9 |
|
dc.identifier.other |
PURE ITEMURL: https://research.aalto.fi/en/publications/99ff533b-7caa-413f-b3b0-14b1994a2af9 |
|
dc.identifier.other |
PURE FILEURL: https://research.aalto.fi/files/36769264/Game_Theoretical_Analysis_on_Encrypted_Cloud_Data_Deduplication.pdf |
|
dc.identifier.uri |
https://aaltodoc.aalto.fi/handle/123456789/40331 |
|
dc.description.abstract |
Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice depends on whether all system players or stakeholders are willing to accept and execute them in a cooperative way, which was scarcely investigated in the previous literature. In this paper, we employ a non-cooperative game to model the interactions in a client-side server-controlled deduplication scheme (S-DEDU) [1] and construct an incentive mechanism based on payment discount to motivate its final ac- ceptance. The experimental results based on a real-world dataset demonstrate the individual rationality, incentive compatibility, profitability and robustness of our incentive mechanism. |
en |
dc.format.extent |
11 |
|
dc.format.mimetype |
application/pdf |
|
dc.language.iso |
en |
en |
dc.publisher |
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC |
|
dc.relation.ispartofseries |
IEEE Transactions on Industrial Informatics |
en |
dc.rights |
openAccess |
en |
dc.title |
Game Theoretical Analysis on Encrypted Cloud Data Deduplication |
en |
dc.type |
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä |
fi |
dc.description.version |
Peer reviewed |
en |
dc.contributor.department |
Network Security and Trust |
|
dc.contributor.department |
Xidian University |
|
dc.contributor.department |
Saint Francis Xavier University |
|
dc.contributor.department |
Virginia Polytechnic Institute and State University |
|
dc.contributor.department |
Department of Communications and Networking |
en |
dc.subject.keyword |
cloud computing |
|
dc.subject.keyword |
encrypted data deduplication |
|
dc.subject.keyword |
game theory |
|
dc.subject.keyword |
incentive compatibility |
|
dc.subject.keyword |
incentive mechanism |
|
dc.identifier.urn |
URN:NBN:fi:aalto-201909205357 |
|
dc.identifier.doi |
10.1109/TII.2019.2920402 |
|
dc.type.version |
acceptedVersion |
|