skip to main content
10.1145/2016716.2016721acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdocConference Proceedingsconference-collections
research-article

Secure deduplication on mobile devices

Published:11 July 2011Publication History

ABSTRACT

An increased use of mobile devices such as smart phones, PDAs and tablet computers with capabilities of storing and processing is rapidly growing. It allows users to carry an increasing volume of data, the value of this information must be protected from loss, theft or any kind of accident which may occur with the devices, making the backup process a key factor.

In mobile devices the data transmission has a high cost, in price and energy, and this devices depend on batteries, optimizing the bandwidth use is crucial. Deduplication allows substantial reductions in the data volume to be transmitted over network on backup sessions, by identifying common chunks of data, transferring and storing them only once.

On the other hand, usually mobile devices communications use mobile networks, and cloud storage is a viable solution for data backup.

Consequently it is essential the use of cryptographic processes to protect data, during the transmission but also in storage.

This paper proposes a model and a process for measuring the best performance of a safe and energy efficient backup system.

References

  1. J. F. Gantz et al., ≪The diverse and exploding digital universe: An updated forecast of worldwide information growth through 2011≫, IDC white paper, 2008.Google ScholarGoogle Scholar
  2. X. Nie, L. Qin, J. Zhou, K. Liu, J. Zhu, e Y. Wang, ≪Optimization for data de-duplication algorithm based on file content≫, Frontiers of Optoelectronics in China, p. 1--9, 2010.Google ScholarGoogle Scholar
  3. Y. Won, R. Kim, J. Ban, J. Hur, S. Oh, e J. Lee, ≪PRUN: Eliminating Information Redundancy for Large Scale Data Backup System≫, Computational Science and its Applications, International Conference, pp. 139--144, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. W. Storer, K. Greenan, D. D. E. Long, e E. L. Miller, ≪Secure data deduplication≫, in Proceedings of the 4th ACM international workshop on Storage security and survivability, New York, NY, USA, 2008, p. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Q. He, Z. Li, e X. Zhang, ≪Data deduplication techniques≫, in Future Information Technology and Management Engineering (FITME), 2010 International Conference on, 2010, vol. 1, p. 430--433.Google ScholarGoogle Scholar
  6. C. Liu, Y. Lu, C. Shi, G. Lu, D. H. C. Du, e D.-S. Wang, ≪ADMAD: Application-Driven Metadata Aware De-duplication Archival Storage System≫, Storage Network Architecture and Parallel I/Os, IEEE International Workshop on, vol. 0, pp. 29--35, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Zhu, K. Li, e H. Patterson, ≪Avoiding the disk bottleneck in the data domain deduplication file system≫, in Proceedings of the 6th USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, 2008, p. 18:1--18:14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Park e D. J. Lilja, ≪Characterizing datasets for data deduplication in backup applications≫, in Workload Characterization (IISWC), 2010 IEEE International Symposium on, 2010, p. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Meister e A. Brinkmann, ≪Multi-level comparison of data deduplication in a backup scenario≫, in Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, New York, NY, USA, 2009, p. 8:1--8:12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Quinlan e S. Dorward, ≪Venti: a new approach to archival storage≫, in Proceedings of the Conference on File and Storage Technologies, 2002, p. 89--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Kulkarni, F. Douglis, J. LaVoie, e J. M. Tracey, ≪Redundancy elimination within large collections of files≫, in Proceedings of the annual conference on USENIX Annual Technical Conference, Berkeley, CA, USA, 2004, p. 5--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Mandagere, P. Zhou, M. A. Smith, e S. Uttamchandani, ≪Demystifying data deduplication≫, in Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion, New York, NY, USA, 2008, p. 12--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Min, D. Yoon, e Y. Won, ≪Efficient Deduplication Techniques for Modern Backup Operation≫, IEEE Transactions on Computers, vol. 60, pp. 824--840, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. O. Rabin, Fingerprinting by random polynomials. Center for Research in Computing Techn., Aiken Computation Laboratory, Univ., 1981.Google ScholarGoogle Scholar
  15. Y. Tan, D. Feng, Z. Yan, e G. Zhou, ≪DAM: A DataOwnership-Aware Multi-layered De-duplication Scheme≫, Networking, Architecture, and Storage, International Conference on, vol. 0, pp. 403--411, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Wei, H. Jiang, K. Zhou, e D. Feng, ≪MAD2: A scalable high-throughput exact deduplication approach for network backup services≫, in Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on, 2010, p. 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Anderson e L. Zhang, ≪Fast and secure laptop backups with encrypted de-duplication≫, in Proceedings of the 24th international conference on Large installation system administration, 2010, p. 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Wang, Z. Qin, J. Peng, e J. Wang, ≪A novel encryption scheme for data deduplication system≫, in Communications, Circuits and Systems (ICCCAS), 2010 International Conference on, p. 265--269.Google ScholarGoogle Scholar
  19. N. Balasubramanian, A. Balasubramanian, e A. Venkataramani, ≪Energy consumption in mobile phones: a measurement study and implications for network applications≫, in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, 2009, p. 280--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Rahmati e L. Zhong, ≪Context-for-wireless: context-sensitive energy-efficient wireless data transfer≫, in Proceedings of the 5th international conference on Mobile systems, applications and services, 2007, p. 165--178. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure deduplication on mobile devices

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              OSDOC '11: Proceedings of the 2011 Workshop on Open Source and Design of Communication
              July 2011
              91 pages
              ISBN:9781450308731
              DOI:10.1145/2016716

              Copyright © 2011 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 11 July 2011

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate9of15submissions,60%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader