Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

被引:0
|
作者
Mageshkumar N. [1 ]
Swapna J. [2 ]
Pandiaraj A. [3 ]
Rajakumar R. [7 ]
Krichen M. [4 ,5 ]
Ravi V. [6 ]
机构
[1] Department of Computer Science and Technology, Madanapalle Institute of Technology and Science, Madanapalle
[2] Department of Computer Science & Engineering, Veltech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai
[3] Department of Computing Technology, SRM Institute of Science and Technology, Kattankulathur, chennai
[4] Department of Information Technology, Faculty of Computer Science and Information Technology (FCSIT), Al-Baha University, Alaqiq
[5] ReDCAD Laboratory, University of Sfax, Sfax
[6] Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar
[7] Centre for Automation, School of Computer Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai
关键词
Cloud computing; Cyber security; Deduplication; Diffie-Hellman assumption; Symmetrical encryption;
D O I
10.1016/j.ijin.2023.11.001
中图分类号
学科分类号
摘要
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce storage requirements and optimize bandwidth utilization. To ensure the safeguarding of sensitive data while simultaneously facilitating deduplication, researchers have put forth the concept of convergent encryption as a potential solution. This technique involves encrypting the data prior to its outsourcing, thereby enhancing the confidentiality of the information. In this work, an earnest endeavor is undertaken to formally tackle the issue of authorized data deduplication, with the aim of enhancing data security. Our approach combines the Diffie-Hellman algorithm and symmetrical external decision to protect and popularize information, ensuring end-to-end encryption to encourage user adoption of cloud storage. The proposed model employs block-level deduplication and guarantees the randomness of ciphertexts by generating encryption keys using the Diffie-Hellman algorithm. This method effectively counters both internal and external brute-force attacks, enhancing data security while reducing computational costs. An extensive experimentation is carried out to demonstrate that our approach is particularly beneficial in scenarios with multiple privilege sets. Overall, the proposed model offers an elaborate framework that maintains data privacy and strengthens security measures, contributing to a more efficient and secure cloud-based document search. © 2023 The Author(s)
引用
收藏
页码:301 / 309
页数:8
相关论文
共 50 条
  • [1] A Secure Hierarchical Deduplication System in Cloud Storage
    Yao, Xin
    Lin, Yaping
    Liu, Qin
    Zhang, Yanchao
    2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [2] Secure Deduplication on Public Cloud Storage
    Graupner, Hendrik
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Meinel, Christoph
    ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 34 - 41
  • [3] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [4] Secure Image Deduplication in Cloud Storage
    Gang, Han
    Yan, Hongyang
    Xu, Lingling
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 243 - 251
  • [5] Secure proof of storage with deduplication for cloud storage systems
    Shin, Youngjoo
    Koo, Dongyoung
    Hur, Junbeom
    Yun, Joobeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19363 - 19378
  • [6] FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
    Jiang, Tao
    Yuan, Xu
    Chen, Yuan
    Cheng, Ke
    Wang, Liangmin
    Chen, Xiaofeng
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2466 - 2483
  • [7] Cloud Storage: A Review on Secure Deduplication and Issues
    Joice, S. Annie
    Mohamed, M. A. Maluk
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (03): : 861 - 873
  • [8] Secure proof of storage with deduplication for cloud storage systems
    Youngjoo Shin
    Dongyoung Koo
    Junbeom Hur
    Joobeom Yun
    Multimedia Tools and Applications, 2017, 76 : 19363 - 19378
  • [9] LSDedup: Layered Secure Deduplication for Cloud Storage
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Huang, Hejiao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (02) : 422 - 435
  • [10] Efficient and Secure File Deduplication in Cloud Storage
    Shin, Youngjoo
    Kim, Kwangjo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 184 - 197