{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:52:17Z","timestamp":1756896737060,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811003554"},{"type":"electronic","value":"9789811003561"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0356-1_43","type":"book-chapter","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T14:24:58Z","timestamp":1453127098000},"page":"409-417","source":"Crossref","is-referenced-by-count":3,"title":["A Video Deduplication Scheme with Privacy Preservation in IoT"],"prefix":"10.1007","author":[{"given":"Xuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Jie","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Biao","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,19]]},"reference":[{"issue":"15","key":"43_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-38348-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"M Bellare","year":"2013","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296\u2013312. Springer, Heidelberg (2013)"},{"issue":"11","key":"43_CR3","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.4304\/jcp.8.11.2768-2775","volume":"8","author":"M Chen","year":"2013","unstructured":"Chen, M., Wang, S., Tian, L.: A high-precision duplicate image deduplication approach. J. Comput. 8(11), 2768\u20132775 (2013)","journal-title":"J. Comput."},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 617\u2013624 (2002)","DOI":"10.1109\/ICDCS.2002.1022312"},{"issue":"6","key":"43_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Secur. Priv. 8(6), 40\u201347 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Kaaniche, N., Laurent, M.: A secure client side deduplication scheme in cloud storage environments. In: Proceedings of the 6th International Conference on New Technologies, Mobility and Security, pp. 1\u20137 (2014)","DOI":"10.1109\/NTMS.2014.6814002"},{"key":"43_CR7","unstructured":"Katiyar, A., Weissman, J.: Videdup: an application-aware framework for video de-duplication. In: Proceedings of the 3rd USENIX Conference on Hot Topics in Storage and File Systems, p. 7. USENIX Association (2011)"},{"issue":"1","key":"43_CR8","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s12652-012-0131-1","volume":"5","author":"SL Kiani","year":"2014","unstructured":"Kiani, S.L., Anjum, A., Antonopoulos, N., Knappmeyer, M.: Context-aware service utilisation in the clouds and energy conservation. J. Ambient Intell. Humanized Comput. 5(1), 111\u2013131 (2014)","journal-title":"J. Ambient Intell. Humanized Comput."},{"issue":"6","key":"43_CR9","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Chen, X., Li, M., Lee, P., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615\u20131625 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"43_CR10","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s12652-013-0217-4","volume":"6","author":"X Li","year":"2014","unstructured":"Li, X., Zhang, G., Zhang, X.: Image encryption algorithm with compound chaotic maps. J. Ambient Intell. Humanized Comput. 6, 563 (2014)","journal-title":"J. Ambient Intell. Humanized Comput."},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Litwin, W., Jajodia, S., Schwarz, T.: Privacy of data outsourced to a cloud for selected readers through client-side encryption. In: WPES Proceedings of Annual Acm Workshop on Privacy in the Electronic Society, pp. 171\u2013176 (2012)","DOI":"10.1145\/2046556.2046580"},{"key":"43_CR12","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-1-4419-1674-7_38","volume-title":"The Internet of Things","author":"Carlo Maria Medaglia","year":"2010","unstructured":"Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Proceedings of TIWDC, pp. 389\u2013395 (2009)"},{"issue":"4","key":"43_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2078861.2078864","volume":"7","author":"DT Meyer","year":"2012","unstructured":"Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7(4), 14 (2012)","journal-title":"ACM Trans. Storage"},{"issue":"2","key":"43_CR14","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.compeleceng.2011.01.009","volume":"37","author":"R Roman","year":"2011","unstructured":"Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 37(2), 147\u2013159 (2011)","journal-title":"Comput. Electr. Eng."},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 International Conference on Distributed Computing Systems, pp. 253\u2013262 (2010)","DOI":"10.1109\/ICDCS.2010.34"},{"issue":"1","key":"43_CR16","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/TETC.2013.2273797","volume":"1","author":"C Wang","year":"2013","unstructured":"Wang, C., Zhang, B., Ren, K., Roveda, J.M.: Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1(1), 166\u2013177 (2013)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Wang, M., Li, W., Wang, X.: Transferring a generic pedestrian detector towards specific scenes. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3274\u20133281 (2012)","DOI":"10.1109\/CVPR.2012.6248064"},{"issue":"1","key":"43_CR18","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23\u201330 (2010)","journal-title":"Comput. Law Secur. Rev."},{"issue":"12","key":"43_CR19","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284(12), 2775\u20132780 (2011)","journal-title":"Opt. Commun."},{"key":"43_CR20","unstructured":"Zhu, B., Li, K., Patterson, R.H.: Avoiding the disk bottleneck in the data domain deduplication file system. In: Proceedings of the 6th USENIX Conference on File and Storage Technologies, pp. 269\u2013282 (2008)"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0356-1_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:47:20Z","timestamp":1748753240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0356-1_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811003554","9789811003561"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0356-1_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}